"Glenn Greenwald, writing on online news website The Intercept, said the reports by the Sunday Times and BBC were based on the false premise that Snowden kept possession of the files he took from the US National Security Agency."
Journalist Greenwald denies claim that Snowden files breached http://news.yahoo.com/us-journalist-greenwald-rebuts-claim-snowden-files-breached-152128420.html http://news.yahoo.com/us-journalist-greenwald-rebuts-claim-snowden-files-breached-152128420.html Journalist Greenwald denies claim that Snowden files bre... http://news.yahoo.com/us-journalist-greenwald-rebuts-claim-snowden-files-breached-152128420.html A journalist who published the first reports from Edward Snowden's leaked documents offered a detailed rebuttal Monday to allegations that Russian an... View on news.yahoo.com http://news.yahoo.com/us-journalist-greenwald-rebuts-claim-snowden-files-breached-152128420.html Preview by Yahoo ---In FairfieldLife@yahoogroups.com, <richard@...> wrote : As soon as you access the internet data highway with your computer, security is out of the question. The ideal and secure computer is a system without any contact to the outside world - no disks, no flash drives, no CD-DVD drives, or cameras and no direct contact to other computers by modem or network card or cable. Many people do not realize that a computer connected to the internet reveals details about their personal life: who they are, where they work, where they go, who they visit, and their surfing habits. It's all there - housed as digital information at a data center somewhere. Most hacker exploits wouldn't be a problem if programmers were a bit more diligent in their coding. strcpy () is your enemy, strncpy () is your friend.