They let the border pigs keep all of the illegally and coercively stolen private information from the thousands or millions of phones they've already imaged (under the basis of "it was believed to be legal at the time"), so not really.
Third-party doctrine lets them silently access your emails and IMs and texts at rest, and Section 702 as well as creative definitions of "access" let them sniff them all in transit. Privacy from the fed snoops is 100% an illusion; the entire population is under continuous realtime monitoring.
This border search thing is an important but ultimately minor victory; total surveillance is the name of the game in the United States now, and likely will remain so until the country no longer exists.
Strong encryption is the only defense we have against mass surveillance, but sadly most people don't care enough about their own privacy (much less that of others - the classic "What do you have to hide?") to demand it in communications products and services, so the majority of personal networked communications happens in ways that are extremely simple for the corrupt federal government to collect, analyze, and permanently store.
I think you are preaching to the choir a bit, given the HN audience. I suspect that the continuous realtime monitoring that is done by private corporations is as bad or worse. Maybe you don't win the war all at once but one battle at a time.
Third-party doctrine lets them silently access your emails and IMs and texts at rest, and Section 702 as well as creative definitions of "access" let them sniff them all in transit. Privacy from the fed snoops is 100% an illusion; the entire population is under continuous realtime monitoring.
This border search thing is an important but ultimately minor victory; total surveillance is the name of the game in the United States now, and likely will remain so until the country no longer exists.
Strong encryption is the only defense we have against mass surveillance, but sadly most people don't care enough about their own privacy (much less that of others - the classic "What do you have to hide?") to demand it in communications products and services, so the majority of personal networked communications happens in ways that are extremely simple for the corrupt federal government to collect, analyze, and permanently store.