Complaining that the electoral college weights the votes in Wyoming roughly four times as heavily as the votes in Michigan, Lessig argues that the popular vote should be respected, and that the authors of the U.S. Constitution "left the electors free to choose. They should exercise that choice by leaving the election as the people decided it: in Clinton's favor."
Meanwhile, Politico is reporting that six electors, "mostly former Bernie Sanders supporters who hail from Washington state and Colorado," are already urging electors pledged to Clinton and Trump to instead coalesce around "a consensus pick like Mitt Romney or John Kasich." And the ethics lawyers for both President Obama and President Bush both told one liberal site "that if Trump continues to retain ownership over his sprawling business interests by the time the electors meet on December 19, they should reject Trump." Finally, from the original submission:
Even Donald Trump has called the Electoral College a "total sham." Is it time for the Electoral College to reflect the popular vote?
Thursday a WikiLeaks representative expressed surprise that, despite the end of the U.S. election, Julian Assange's internet connection in the Ecuadorean Embassy in London has not yet been restored.
But the context is missing, and could show a larger attempt to soften Hillary Clinton's position on encryption. While Jackson writes that at Apple, "We share law enforcement's concerns about the threat to citizens," she later writes "Strong encryption does not eliminate Apple's ability to give law enforcement meta-data or any of a number of other very useful categories of data."
The email also compliments Clinton for her "principled and nuanced stance" on encryption in a December debate against Bernie Sanders. Clinton had said "maybe the backdoor is the wrong door, and I understand what Apple and others are saying about that. But I also understand, when a law enforcement official charged with the responsibility of preventing attack...well, if we can't know what someone is planning, we are going to have to rely on the neighbor... I just think there's got to be a way, and I would hope that our tech companies would work with government to figure that out."
Researchers found the emails by tracing the malicious URLs set up by [state-sponsored hacking group] Fancy Bear using Bitly, a link shortening service... "We were monitoring bit.ly and saw the accounts being created in real time," said Phil Burdette, a senior security researcher at SecureWorks, explaining how they stumbled upon the the URLs set up by Fancy Bear.
The URL apparently resolved to accounts-google.com (rather than accounts.google.com), and Burdette says "They did a great job with capturing the look and feel of Google."