Not only does the authority want the powers to intercept the times, dates and details of telecommunications information, it also wants access to the contents of emails, social media chats and text messages."
Link to Original Source
Please create an account to participate in the Slashdot moderation system
"The algorithm to do that is extremely nasty. You might want to mug someone with it." -- M. Devine, Computer Science 340