... boots up lawful intercept operating systems. Now, assume that we get an owner-controls ...
... move the spying right to the edge, to the user of the computer, the owner of the computer. ...