Read my new book on Snowden, Privacy for Me and Not for Thee: The Movement for Invincible Personal Encryption, Radical State Transparency, and the Snowden Hack on Kindle or Scribd.
Here's my interview with Ronald Prins, following up on a series of posts here, here, and here -- and I will have further comments on the back story later.
This took place over January 8-10 on Twitter in DMs which he gave permission to publish:
@catfitz
Hi there! So were you trying to actually talk to Edward Snowden encrypted on hushmail, or just spoofing something or what was the deal?
What was the purpose of issuing the public key related to his old addresses including one that was shut down at lavabits?
@cryptoron
No purpose. Just playing around with public keys
@catfitz
Did you get an encrypted message back from Ed? Say did you know him before all this?
@cryptoron
No I did not
@catfitz
No you didn't know him AND no you didn't get any messages from him?
Were you hoping to make the point that mining public keys is misleading?
Can I quote you on the record?
@cryptoron
Yes You can
@catfitz
Thanks. So can I clarify again: No you didn't know Edward Snowden AND no you didn't get any messages from him?
and Were you hoping to make the point that mining public keys is misleading?
@crypton
No I had no point in signing his key.
Well, they don't call him Crypto Ron for nothing, he can be cryptic.
Recent Comments