Search For encrypt In Quotes 3

A company can spend hundreds of thousands of dollars on firewalls intrusion detection systems and encryption and other security technologies but if an attacker can call one trusted person within the company and that person complies and if the attacker gets in then all that money spent on technology is essentially wasted.

We get information in the mail the regular postal mail encrypted or not vet it like a regular news organization format it - which is sometimes something that's quite hard to do when you're talking about giant databases of information - release it to the public and then defend ourselves against the inevitable legal and political attacks.

In my role as Wikileaks editor I've been involved in fighting off many legal attacks. To do that and keep our sources safe we have had to spread assets encrypt everything and move telecommunications and people around the world to activate protective laws in different national jurisdictions.