this post was submitted on 07 Oct 2024
546 points (99.3% liked)

Technology

59597 readers
4321 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 41 comments
sorted by: hot top controversial new old
[–] [email protected] 332 points 1 month ago (2 children)

Wow. It's almost like we've been warning for years that putting backdoors into software, systems, and encryption would allow nefarious parties to exploit them.

[–] [email protected] 141 points 1 month ago (4 children)

Think about the children . It will make it easier for police to access instead of doing actual police work and getting a warrant.

[–] [email protected] 55 points 1 month ago (1 children)

Well yeah but then they'd have to expand the hiring pool beyond the dumbest jock you knew in high school and those people tend to balk at doing fascism so...

[–] [email protected] 32 points 1 month ago

Hey, be fair! They also hire the three bullies who hung out by the bleachers smoking cigarettes.

[–] [email protected] 13 points 1 month ago

Sorry, I only think of children during school shootings, it's easier that way.

[–] [email protected] 2 points 1 month ago

you don't want police to think about children, or atleast I don't.

[–] [email protected] 26 points 1 month ago (1 children)

The FBI is the nefarious party lol

[–] [email protected] 1 points 1 month ago

Waco intensifies

[–] [email protected] 148 points 1 month ago* (last edited 1 month ago) (2 children)

~~China~~ USA hacked Verizon, AT&T and Lumen then left the door open for anybody else

[–] [email protected] 67 points 1 month ago

If the door exists, then it can be opened

[–] [email protected] 47 points 1 month ago (1 children)

And this is why the NSA is supposed to close exploits rather than harvest them for surveillance.

This is why surveillance backdoors are always bad, and you can't math around that.

[–] [email protected] 3 points 1 month ago

Can't weasel around math you mean? They don't think they can, it's collateral damage.

[–] [email protected] 126 points 1 month ago (1 children)

What?? But the FBI called dibs on that backdoor! /s

It's almost like putting backdoors into software as a whole is a bad idea cause anyone who knows of it can use it, not just "tHe GoOd GuYs"

[–] sukhmel 4 points 1 month ago

cause anyone who knows of it can use it

…and the ones who don't know of it will one day become the ones who know

[–] [email protected] 73 points 1 month ago

Omg the back doors work for anyone who can gain access to them??? Shocked-pikachu.jpg

[–] [email protected] 69 points 1 month ago (2 children)

This article is getting saved, for the next time some idiot proposes 'lawful backdoors', which will inevitably happen.

[–] [email protected] 34 points 1 month ago (1 children)

Nervously glances at TPM and TSA approved locks.

[–] [email protected] 26 points 1 month ago (4 children)

I still love the fact that those TSA keys are all available online as 3D files and likely as metal as well

[–] [email protected] 4 points 1 month ago

I know for a fact you can get a metal set for a few dollars plus shipping.

[–] [email protected] 2 points 1 month ago

I just went and looked, set of multiple TSA master keys for sale online, numbered with which ones they are the master keys for.

[–] anzo 2 points 1 month ago (2 children)

Those locks are kinda optional. And luggage is way less important than all of one's communication ; imho.

[–] [email protected] 8 points 1 month ago

Oh absolutely, but it does do something that I'm not sure people realize: it normalizes the idea of a government agent holding the keys to all of your stuff.

[–] [email protected] 2 points 1 month ago

The bad part is when people take a luggage lock and use it for their Gym locker, or the locker at the pool. Somewhere that really REALLY shouldn't be using a weak lock with a readily available master key.

[–] [email protected] 46 points 1 month ago (1 children)

I remember them trying to get Apple to put in a back door as well

[–] [email protected] 19 points 1 month ago (2 children)

Only Apple can use that data for profit! Now the Alphabet agencies just buy that data from brokers..... I just realized how funny the parent company to Google name change is.

[–] [email protected] 3 points 1 month ago

Dang, you're right! It's like noticing the arrow in fedex

[–] [email protected] 39 points 1 month ago (4 children)

Article author struggles with clean links

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack btw

The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel,

That's interesting. Must be a coincidence.

and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

"Don't worry, guys we tried to backdoor all devices but failed, see?"

Meanwhile, Intel ME, AMD "Secure Processor", and ARM "TrustZone":

[–] [email protected] 4 points 1 month ago

That’s interesting. Must be a coincidence.

Kinda coincides in time with Israel becoming less of a normal West-aligned state and more of a spoiled child whom everyone pats, not very well-behaving at that.

Though TBH this was the case under Reagan too. It's just that there's difference between support for Israel and Israel's penetration back.

[–] [email protected] 4 points 1 month ago (2 children)

That link is a 404 for me.

[–] [email protected] 3 points 1 month ago

Same. The OP article is interesting, but was hoping for more than a few wiki links of past instances. Is there more verifiable evidence for this instance? Don't doubt the claim, just curious.

[–] [email protected] -1 points 1 month ago* (last edited 1 month ago)

Dawg

Edit: y'all no fun

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

I think you should watch this Great Video by CCC,de on Intel ME it has some great facts and information on the deal with IntelME without all the fearmongering and conspiracy theories other videos and blogs usually pump out.

[–] [email protected] 21 points 1 month ago

Can't buy Huawei Networking gear, if we get hacked it has the be through our own backdoor.

[–] [email protected] 3 points 1 month ago

@db0 works as intended

[–] [email protected] 2 points 1 month ago

nice, that'll tech them.