this post was submitted on 07 Oct 2024
549 points (99.1% liked)

Technology

59974 readers
3693 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
all 44 comments
sorted by: hot top controversial new old
[–] chronicledmonocle 333 points 2 months ago (2 children)

Wow. It's almost like we've been warning for years that putting backdoors into software, systems, and encryption would allow nefarious parties to exploit them.

[–] gaiussabinus 141 points 2 months ago (4 children)

Think about the children . It will make it easier for police to access instead of doing actual police work and getting a warrant.

[–] [email protected] 55 points 2 months ago (1 children)

Well yeah but then they'd have to expand the hiring pool beyond the dumbest jock you knew in high school and those people tend to balk at doing fascism so...

[–] [email protected] 31 points 2 months ago

Hey, be fair! They also hire the three bullies who hung out by the bleachers smoking cigarettes.

[–] Lennny 13 points 2 months ago

Sorry, I only think of children during school shootings, it's easier that way.

[–] [email protected] 2 points 2 months ago

you don't want police to think about children, or atleast I don't.

[–] BMTea 26 points 2 months ago (1 children)

The FBI is the nefarious party lol

[–] DogWater 1 points 2 months ago

Waco intensifies

[–] [email protected] 149 points 2 months ago* (last edited 2 months ago) (3 children)

~~China~~ USA hacked Verizon, AT&T and Lumen then left the door open for anybody else

[–] [email protected] 67 points 2 months ago

If the door exists, then it can be opened

[–] [email protected] 48 points 2 months ago (1 children)

And this is why the NSA is supposed to close exploits rather than harvest them for surveillance.

This is why surveillance backdoors are always bad, and you can't math around that.

[–] rottingleaf 4 points 2 months ago

Can't weasel around math you mean? They don't think they can, it's collateral damage.

[–] [email protected] 127 points 2 months ago (1 children)

What?? But the FBI called dibs on that backdoor! /s

It's almost like putting backdoors into software as a whole is a bad idea cause anyone who knows of it can use it, not just "tHe GoOd GuYs"

[–] [email protected] 4 points 2 months ago

cause anyone who knows of it can use it

…and the ones who don't know of it will one day become the ones who know

[–] NegativeLookBehind 73 points 2 months ago

Omg the back doors work for anyone who can gain access to them??? Shocked-pikachu.jpg

[–] [email protected] 69 points 2 months ago (2 children)

This article is getting saved, for the next time some idiot proposes 'lawful backdoors', which will inevitably happen.

[–] Bytemeister 34 points 2 months ago (1 children)

Nervously glances at TPM and TSA approved locks.

[–] [email protected] 26 points 2 months ago (4 children)

I still love the fact that those TSA keys are all available online as 3D files and likely as metal as well

[–] [email protected] 4 points 2 months ago

I know for a fact you can get a metal set for a few dollars plus shipping.

[–] Draconic_NEO 2 points 2 months ago

I just went and looked, set of multiple TSA master keys for sale online, numbered with which ones they are the master keys for.

[–] [email protected] 2 points 2 months ago (2 children)

Those locks are kinda optional. And luggage is way less important than all of one's communication ; imho.

[–] [email protected] 8 points 2 months ago

Oh absolutely, but it does do something that I'm not sure people realize: it normalizes the idea of a government agent holding the keys to all of your stuff.

[–] Draconic_NEO 2 points 2 months ago

The bad part is when people take a luggage lock and use it for their Gym locker, or the locker at the pool. Somewhere that really REALLY shouldn't be using a weak lock with a readily available master key.

[–] [email protected] 45 points 2 months ago (2 children)

I remember them trying to get Apple to put in a back door as well

[–] horse_battery_staple 21 points 2 months ago (2 children)

Only Apple can use that data for profit! Now the Alphabet agencies just buy that data from brokers..... I just realized how funny the parent company to Google name change is.

[–] [email protected] 4 points 2 months ago

Dang, you're right! It's like noticing the arrow in fedex

[–] [email protected] 3 points 2 months ago

That was a psyop my man

Got normies super comfortable ;)

[–] [email protected] 39 points 2 months ago (4 children)

Article author struggles with clean links

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack btw

The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel,

That's interesting. Must be a coincidence.

and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

"Don't worry, guys we tried to backdoor all devices but failed, see?"

Meanwhile, Intel ME, AMD "Secure Processor", and ARM "TrustZone":

[–] rottingleaf 4 points 2 months ago

That’s interesting. Must be a coincidence.

Kinda coincides in time with Israel becoming less of a normal West-aligned state and more of a spoiled child whom everyone pats, not very well-behaving at that.

Though TBH this was the case under Reagan too. It's just that there's difference between support for Israel and Israel's penetration back.

[–] [email protected] 4 points 2 months ago (2 children)

That link is a 404 for me.

[–] [email protected] 3 points 2 months ago

Same. The OP article is interesting, but was hoping for more than a few wiki links of past instances. Is there more verifiable evidence for this instance? Don't doubt the claim, just curious.

[–] [email protected] -1 points 2 months ago* (last edited 2 months ago)

Dawg

Edit: y'all no fun

[–] Draconic_NEO 1 points 2 months ago* (last edited 2 months ago)

I think you should watch this Great Video by CCC,de on Intel ME it has some great facts and information on the deal with IntelME without all the fearmongering and conspiracy theories other videos and blogs usually pump out.

[–] aluminium 22 points 2 months ago

Can't buy Huawei Networking gear, if we get hacked it has the be through our own backdoor.

[–] [email protected] 2 points 2 months ago

@db0 works as intended

[–] Korkki 1 points 2 months ago

nice, that'll tech them.