Written by Dorian Lynskey on The Guardian.
“You are building an infrastructure that can be later co-opted in undesirable ways by large multinationals and state surveillance apparatus, and compromised by malicious hackers,” says Dr Michael Veale, a lecturer in digital rights and regulation at UCL Faculty of Laws at University College London.