These activities can be misconstrued, misinterpreted, and used to harm you as an individual even without the government having any intent to do you wrong.
Edward SnowdenThe definition of a security state is one that prioritizes security over all other considerations.
Edward SnowdenThe bare bones tools for a cyber-attack are to identify a vulnerability in the system you want to gain access to or you want to subvert or you want to deny, destroy, or degrade, and then to exploit it, which means to send codes, deliver code to that system somehow and get that code to that vulnerability, to that crack in their wall, jam it in there, and then have it execute.
Edward SnowdenThere are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes.
Edward Snowden