this post was submitted on 07 Oct 2024
547 points (99.1% liked)

Technology

58678 readers
3902 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 44 comments
sorted by: hot top controversial new old
[–] [email protected] 333 points 1 week ago (2 children)

Wow. It's almost like we've been warning for years that putting backdoors into software, systems, and encryption would allow nefarious parties to exploit them.

[–] [email protected] 141 points 1 week ago (4 children)

Think about the children . It will make it easier for police to access instead of doing actual police work and getting a warrant.

[–] [email protected] 55 points 1 week ago (1 children)

Well yeah but then they'd have to expand the hiring pool beyond the dumbest jock you knew in high school and those people tend to balk at doing fascism so...

[–] [email protected] 31 points 1 week ago

Hey, be fair! They also hire the three bullies who hung out by the bleachers smoking cigarettes.

[–] [email protected] 13 points 1 week ago

Sorry, I only think of children during school shootings, it's easier that way.

[–] [email protected] 2 points 1 week ago

you don't want police to think about children, or atleast I don't.

[–] [email protected] 26 points 1 week ago (1 children)

The FBI is the nefarious party lol

[–] [email protected] 1 points 1 week ago

Waco intensifies

[–] [email protected] 149 points 1 week ago* (last edited 1 week ago) (3 children)

~~China~~ USA hacked Verizon, AT&T and Lumen then left the door open for anybody else

[–] [email protected] 67 points 1 week ago

If the door exists, then it can be opened

[–] [email protected] 48 points 1 week ago (1 children)

And this is why the NSA is supposed to close exploits rather than harvest them for surveillance.

This is why surveillance backdoors are always bad, and you can't math around that.

[–] [email protected] 4 points 1 week ago

Can't weasel around math you mean? They don't think they can, it's collateral damage.

[–] [email protected] 127 points 1 week ago (1 children)

What?? But the FBI called dibs on that backdoor! /s

It's almost like putting backdoors into software as a whole is a bad idea cause anyone who knows of it can use it, not just "tHe GoOd GuYs"

[–] [email protected] 4 points 1 week ago

cause anyone who knows of it can use it

…and the ones who don't know of it will one day become the ones who know

[–] [email protected] 73 points 1 week ago

Omg the back doors work for anyone who can gain access to them??? Shocked-pikachu.jpg

[–] [email protected] 69 points 1 week ago (2 children)

This article is getting saved, for the next time some idiot proposes 'lawful backdoors', which will inevitably happen.

[–] [email protected] 34 points 1 week ago (1 children)

Nervously glances at TPM and TSA approved locks.

[–] [email protected] 26 points 1 week ago (4 children)

I still love the fact that those TSA keys are all available online as 3D files and likely as metal as well

[–] [email protected] 4 points 1 week ago

I know for a fact you can get a metal set for a few dollars plus shipping.

[–] [email protected] 2 points 1 week ago

I just went and looked, set of multiple TSA master keys for sale online, numbered with which ones they are the master keys for.

[–] [email protected] 2 points 1 week ago (2 children)

Those locks are kinda optional. And luggage is way less important than all of one's communication ; imho.

[–] [email protected] 8 points 1 week ago

Oh absolutely, but it does do something that I'm not sure people realize: it normalizes the idea of a government agent holding the keys to all of your stuff.

[–] [email protected] 2 points 1 week ago

The bad part is when people take a luggage lock and use it for their Gym locker, or the locker at the pool. Somewhere that really REALLY shouldn't be using a weak lock with a readily available master key.

[–] [email protected] 45 points 1 week ago (2 children)

I remember them trying to get Apple to put in a back door as well

[–] [email protected] 21 points 1 week ago (2 children)

Only Apple can use that data for profit! Now the Alphabet agencies just buy that data from brokers..... I just realized how funny the parent company to Google name change is.

[–] [email protected] 4 points 1 week ago

Dang, you're right! It's like noticing the arrow in fedex

[–] [email protected] 1 points 1 week ago (1 children)

I just realized how funny the parent company to Google name change is.

Thank you for this sentence, I thought you were talking about Google, YouTube, etc at first

[–] [email protected] 1 points 1 week ago

At least they were not talking about Lemmy, Mastodon, etc. like someone is trying to screw up the Fediverse.

[–] [email protected] 3 points 1 week ago

That was a psyop my man

Got normies super comfortable ;)

[–] [email protected] 39 points 1 week ago (4 children)

Article author struggles with clean links

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack btw

The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel,

That's interesting. Must be a coincidence.

and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

"Don't worry, guys we tried to backdoor all devices but failed, see?"

Meanwhile, Intel ME, AMD "Secure Processor", and ARM "TrustZone":

[–] [email protected] 4 points 1 week ago (2 children)

That link is a 404 for me.

[–] [email protected] 3 points 1 week ago

Same. The OP article is interesting, but was hoping for more than a few wiki links of past instances. Is there more verifiable evidence for this instance? Don't doubt the claim, just curious.

[–] [email protected] -1 points 1 week ago* (last edited 1 week ago)

Dawg

Edit: y'all no fun

[–] [email protected] 4 points 1 week ago

That’s interesting. Must be a coincidence.

Kinda coincides in time with Israel becoming less of a normal West-aligned state and more of a spoiled child whom everyone pats, not very well-behaving at that.

Though TBH this was the case under Reagan too. It's just that there's difference between support for Israel and Israel's penetration back.

[–] [email protected] 1 points 1 week ago* (last edited 1 week ago)

I think you should watch this Great Video by CCC,de on Intel ME it has some great facts and information on the deal with IntelME without all the fearmongering and conspiracy theories other videos and blogs usually pump out.

[–] [email protected] 22 points 1 week ago

Can't buy Huawei Networking gear, if we get hacked it has the be through our own backdoor.

[–] [email protected] 2 points 1 week ago

@db0 works as intended

[–] [email protected] 1 points 1 week ago

nice, that'll tech them.