Submitted by benton on Mon, 01/11/2016 - 06:59 Links: Christopher Mims: If we compromise the security of our computing devices in a misbegotten attempt to stem criminal behavior or terrorism, then we deserve what will followOffsite url: Open offsite URL