this post was submitted on 16 May 2025
711 points (99.3% liked)

Technology

70285 readers
3487 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 33 points 1 week ago* (last edited 1 week ago) (5 children)

From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions.

Oh? It is possible? Pray tell, how?

[–] [email protected] 10 points 1 week ago (4 children)

Screen recording or snapshots like Windows Recall. Or keyboard telemitry.

But that's it I think.

[–] [email protected] 15 points 1 week ago (3 children)

It's well known that iphone, google samsung and microsoft android keyboards are the most used keyloggers in the world.

[–] [email protected] 0 points 6 days ago

Nah apple wouldn’t do that :)

load more comments (2 replies)
load more comments (2 replies)
load more comments (2 replies)