this post was submitted on 13 Jun 2024
-8 points (42.0% liked)

Privacy

31859 readers
389 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I know people have mixed opinions on Braxman but I don't see any huge leaps in logic here tbh... Thoughts?

all 24 comments
sorted by: hot top controversial new old
[–] [email protected] 17 points 4 months ago (2 children)

3 letter agencies, governments in general and data hungry companies will continue searching for a way to bypass encryption. And just a reminder: direct access to the system (remote or physical) bypasses all kinds of encryption unless it's protected separately. Backdoors and kernel level anti-cheats ftw

[–] [email protected] 5 points 4 months ago (3 children)

Physical access trumps all.

[–] [email protected] 3 points 4 months ago (1 children)

Physical access like an NPU chip fixed onto your motherboard?

[–] [email protected] 2 points 4 months ago (1 children)

Sure, anything with direct bus access to unencrypted data.... that'll do it

[–] [email protected] 3 points 4 months ago (1 children)

I didn't mean that. I meant if the hacker has access to the administrator (or just user in case with E2EE messengers) account, they can see and download anything, no matter how encrypted it is. The chips can do stuff as well but idk any proof of that tbh

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago) (1 children)

Sure, side channel leakage if you can run locally.

Honestly, most machines have enough cores, that you could pin a process to a specific core giving it independent cache, and work around a lot of these side channel attacks. So you're encrypted end to end messenger would get an exclusive core. Kind of like how we do VM pinning nowadays

[–] [email protected] 3 points 4 months ago (1 children)
[–] [email protected] 1 points 4 months ago (1 children)
[–] [email protected] 3 points 4 months ago
[–] [email protected] 3 points 4 months ago

Not really? If disks are encrypted good luck getting anything out of it. A remote access to a running machine? It's all laid there.

[–] [email protected] 3 points 4 months ago* (last edited 4 months ago)

Eh, kind of. Remote Desktop with an admin account would be more useful than physical access to a locked computer. Because if Bitlocker is enabled, then all that matters is that you can sign into the computer. Use strong passwords, don’t open RDP to the WAN, lock your workstations when walking away, etc…

Even cloning the drive to crack later (historically, this was a popular choice if you had physical access) is pretty useless if you don’t have a user’s password.

[–] [email protected] 10 points 4 months ago (1 children)

Death of encryption?

They are rolling out forced turned-on-by-default BitLocker hard drive encryption for everyone using Windows 11. Including all those people who dont understand how it works and won't save their backup keys.

Microsoft is dumb but pretending they are trying to kill encryption is also dumb.

[–] [email protected] 1 points 4 months ago

I suppose I meant to say "end to end encryption". It's no secret that it's been under attack from the top down for a long time but from my understanding the legislation keeps getting shot down. This seems like a perfect workaround unless I'm missing something.

[–] [email protected] 2 points 4 months ago

Here is an alternative Piped link(s):

https://piped.video/PnG66fHKRw0

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.