# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 12
# self = https://watcher.sour.is/conv/7fbgfpa
@slashdot This comment is precisely my thoughts too! Of course they can decode the contents of Signal data on a phone! By physically having access to and by opening up the phones device and having full access to the private keys stored on it d'uh\n\n
@slashdot This comment is precisely my thoughts too! Of course they can decode the contents of Signal data on a phone! By physically having access to and by opening up the phones device and having full access to the private keys stored on it d'uh\n\n
@slashdot This comment is precisely my thoughts too! Of course they can decode the contents of Signal data on a phone! By physically having access to and by opening up the phones device and having full access to the private keys stored on it d'uh

@slashdot This comment is precisely my thoughts too! Of course they can decode the contents of Signal data on a phone! By physically having access to and by opening up the phones device and having full access to the private keys stored on it d'uh

so here’s the Github issue that discusses in detail how this so-called company allegedly broke the signal encryption hah\n\nhttps://github.com/signalapp/Signal-Android/issues/10277\n\nHint: They didn’t! They had full root access tto the phone and access to the key store on the device \n\n🤦‍♂️
so here’s the Github issue that discusses in detail how this so-called company allegedly broke the signal encryption hah\n\nhttps://github.com/signalapp/Signal-Android/issues/10277\n\nHint: They didn’t! They had full root access tto the phone and access to the key store on the device \n\n🤦‍♂️
so here’s the Github issue that discusses in detail how this so-called company allegedly broke the signal encryption hah

https://github.com/signalapp/Signal-Android/issues/10277

Hint: They didn’t! They had full root access tto the phone and access to the key store on the device

🤦‍♂️
so here’s the Github issue that discusses in detail how this so-called company allegedly broke the signal encryption hah

https://github.com/signalapp/Signal-Android/issues/10277

Hint: They didn’t! They had full root access tto the phone and access to the key store on the device

🤦‍♂️
sorry for anyone reading this conversation calmer I’ve gone and enabled a couple extra security options in the Signal App just in case I do leave my phone lying around for some unwanted person to pick up and view 😁

sorry for anyone reading this conversation calmer I’ve gone and enabled a couple extra security options in the Signal App just in case I do leave my phone lying around for some unwanted person to pick up and view 😁\n\n
sorry for anyone reading this conversation calmer I’ve gone and enabled a couple extra security options in the Signal App just in case I do leave my phone lying around for some unwanted person to pick up and view 😁

sorry for anyone reading this conversation calmer I’ve gone and enabled a couple extra security options in the Signal App just in case I do leave my phone lying around for some unwanted person to pick up and view 😁\n\n