Gordon Corera
👤 PersonAppearances Over Time
Podcast Appearances
So, you know, it's a little clue in the name.
Or not so subterranean narcissism. You've got to pick a code name. So, I mean, why not? It's not the worst one to pick, I could think. Anyway, he says in this email, I have some stuff you might be interested in. It is vague, though. And here's what's interesting. Greenwald is told that to get the information, he has to use a type of encryption called PGP, pretty good privacy.
Or not so subterranean narcissism. You've got to pick a code name. So, I mean, why not? It's not the worst one to pick, I could think. Anyway, he says in this email, I have some stuff you might be interested in. It is vague, though. And here's what's interesting. Greenwald is told that to get the information, he has to use a type of encryption called PGP, pretty good privacy.
Or not so subterranean narcissism. You've got to pick a code name. So, I mean, why not? It's not the worst one to pick, I could think. Anyway, he says in this email, I have some stuff you might be interested in. It is vague, though. And here's what's interesting. Greenwald is told that to get the information, he has to use a type of encryption called PGP, pretty good privacy.
I've always liked that it's only pretty good privacy. Well, I think it's supposed to be ironic. So this is, I mean, this is interesting. As a journalist myself, it's not the normal encryption that's built into your laptop or phone. It's something which provides really quite intense encryption, which if you use it properly... It shouldn't be crackable.
I've always liked that it's only pretty good privacy. Well, I think it's supposed to be ironic. So this is, I mean, this is interesting. As a journalist myself, it's not the normal encryption that's built into your laptop or phone. It's something which provides really quite intense encryption, which if you use it properly... It shouldn't be crackable.
I've always liked that it's only pretty good privacy. Well, I think it's supposed to be ironic. So this is, I mean, this is interesting. As a journalist myself, it's not the normal encryption that's built into your laptop or phone. It's something which provides really quite intense encryption, which if you use it properly... It shouldn't be crackable.
If someone intercepts that message, even the NSA, they wouldn't be able to decipher and decode what's in the message. So Snowden has said, look, you need to use this and install this in order for me to be able to send you what I need to send. And it's interesting because Greenwald doesn't get around to doing it. He's just busy. He's busy.
If someone intercepts that message, even the NSA, they wouldn't be able to decipher and decode what's in the message. So Snowden has said, look, you need to use this and install this in order for me to be able to send you what I need to send. And it's interesting because Greenwald doesn't get around to doing it. He's just busy. He's busy.
If someone intercepts that message, even the NSA, they wouldn't be able to decipher and decode what's in the message. So Snowden has said, look, you need to use this and install this in order for me to be able to send you what I need to send. And it's interesting because Greenwald doesn't get around to doing it. He's just busy. He's busy.
But he also admits in his memoir, No Place to Hide, that he's not that into technology. How? No, he's actually not. It all looks a bit too complicated. I think we've all been there. When someone says, you have to install this or do that. And you're like, really? I think that's Greenwald.
But he also admits in his memoir, No Place to Hide, that he's not that into technology. How? No, he's actually not. It all looks a bit too complicated. I think we've all been there. When someone says, you have to install this or do that. And you're like, really? I think that's Greenwald.
But he also admits in his memoir, No Place to Hide, that he's not that into technology. How? No, he's actually not. It all looks a bit too complicated. I think we've all been there. When someone says, you have to install this or do that. And you're like, really? I think that's Greenwald.
So the weeks go by. Puts and takes. So the weeks go by. Eventually, Cincinnatus, you know, this mysterious account, gets back in touch again in late January and says, not willing to share anything until you encrypt something. And Greenwald is clearly thinking, I'm not going to take this seriously unless they show me something. I know it's for real.
So the weeks go by. Puts and takes. So the weeks go by. Eventually, Cincinnatus, you know, this mysterious account, gets back in touch again in late January and says, not willing to share anything until you encrypt something. And Greenwald is clearly thinking, I'm not going to take this seriously unless they show me something. I know it's for real.
So the weeks go by. Puts and takes. So the weeks go by. Eventually, Cincinnatus, you know, this mysterious account, gets back in touch again in late January and says, not willing to share anything until you encrypt something. And Greenwald is clearly thinking, I'm not going to take this seriously unless they show me something. I know it's for real.
And, you know, Snowden actually sends him tutorials on how to do encryption because he's so desperate.
And, you know, Snowden actually sends him tutorials on how to do encryption because he's so desperate.
And, you know, Snowden actually sends him tutorials on how to do encryption because he's so desperate.
It happens all the time. I mean, I literally have one a few weeks ago where someone emailed me. I won't say what it was. Their email address was clearly a kind of made up name and was like, do you have time to meet? I've got something to talk to you about. I'm glad you finally got my message. Yeah. I've been trying to contact you for weeks. Yeah. There are other ways, David.