Re: To use raw power is to make yourself infinitely vulnerable to greater powers -Frank Herbert
Quote: "....terrorists do not hangout on WhatsApp, Facebook...."
But even if they do, they can still use private ciphers. Even if they use the comments area in El Reg to pass messages, the spooks have the same problem. Namely, anyone using a private cipher BEFORE the message enters the channel gets real-time messaging. The spooks on the other hand may have to wait a while, maybe a long while, maybe never to find out what is being said. (See Beale Papers for an example of two message secure for over a century.)
So here's the procedure:
A) Encrypt message with private cipher
B) Avoid locations using CCTV
C) If using a burner phone, make sure that your "honest citizen" phone is switched off or located far away
D) Send the message using a hijacked WiFi access point (or an internet cafe, or a VPN, or a burner phone, or El Reg)
Result: Spooks using the legally mandated backdoor in an end-to-end encrypted public service get:
E) To examine the private cipher message.....
F) ....which came from an IP address which has either no personal identity, or the identity of the wrong person or business
P.S. Like the Beale Papers example, this is a book cipher example. I know, I know....book ciphers are crap. But they might just be good enough to get the job done!