![The Loopcast show](/assets/missing_small.png)
Summary: Dr. Krypt3ia discusses how jihadis use encryption software and broader OPSEC methods. You can read Krypt3ia's broader treatment of jihadi encryption here, here, and here.
Summary: Dr. Krypt3ia discusses how jihadis use encryption software and broader OPSEC methods. You can read Krypt3ia's broader treatment of jihadi encryption here, here, and here.