... move the spying right to the edge, to the user of the computer, the owner of the computer. ...
... boots up lawful intercept operating systems. Now, assume that we get an owner-controls ...