What do you do with that stack? I've used all of those at work as well, but the C/Fortran part is just debugging or pulling the logic for what the system is doing.
> If an organization is in a position to confiscate the camera from a journalist, they're almost certainly ALSO in a position to extract the encryption password from the journalist.
Regardless of who you think was behind the leaks, what makes you think that the blockchain and crypto-currencies in general are not compromised somehow? Based on the BTC mania of 2014, I am not entirely convinced it's not all part of some sort of globalist psy-op. It easily fits into the narrative.