As if anybody here needs a reason to be wary of what you do online, this essay shares how a foreign adversary used back doors that were intentionally put in place to spy on Americans and how the rest of the world probably has the same back doors.

I especially appreciate the phrase “nerd harder” and the quote, “The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia”.

How can IT folk help politicans to understand?

  • StinkySocialist@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    China’s so bad they’ll sneakily do what your own government does right in front of your face 😱 /s

    • WhatAmLemmy@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      It turns out surveillance capitalism was the fox in the hen house all along. Who woulda thunk?

      NOTE: I consider the secret police (aka “intelligence” agencies) and the revolving door between their multi-billion dollar contractors a core tenet of, and intrinsic to, surveillance capitalism… because why split hairs when they’re all coordinating to attack our civil liberties?

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 month ago

    What’s the outrage? Those backdoors were made for governmental use. The only thing is that it was not made for foreign government use, but hey, that is just due to the incompetence of those who designed the backdoor…

    So the blunders of US agencies did harm to millions of people. Lawsuits, anyone?

    • Anonymouse@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      No outrage, just a reminder to encrypt, VPN or whatever to protect yourself from surveillance.

      I don’t like your phrase, “incompetence of those who designed the backdoor”. I was not in the room, but in my mind, the execs said “build a back door for the govn’t” and the engineers said “you can’t do that JUST for one party” then the execs said “do it anyways or get fired, we’re getting fistfulls of cash to do it” and the engineers said “I enjoy feeding my family, it’s your company anyways” and did it.

    • satanmat@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      Eh?

      You can’t build an unpickable back door into a computer system.

      You can’t break encryption for only the good guys.

      The path to hell is paved with good intentions.

      Encryption only works when there is one decryption key. If there are two different keys then it isn’t encrypted bad actors will find a way in

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        That is 100% correct. Nonetheless, the US agencies assumed that they were smarter than basically all of the security community and common sense.

      • umbrella@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        The path to hell is paved with good intentions.

        except the intentions.werent good either.

      • Rain World: Slugcat Game@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        whenever you encrypt something, encrypt with both the intended public key and the fbi’s public key. and send the one encrypted with the fbi’s key to the fbi.

  • HBingZ@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I’m not surprised to hear about the alleged hacking incident involving Verizon, AT&T, and Lumen. However, I think it’s essential to take a step back and consider the motivations behind such actions.

    Why would China, or any other country, go to such great lengths to hack into these companies? Is it simply a matter of malicious intent, or is there something more at play? Perhaps it’s a response to the increasing scrutiny and pressure being applied to Chinese companies operating in the US.

    It’s also worth considering the role of the FBI’s backdoor in this incident. Was it a vulnerability that was exploited, or was it a deliberate attempt to create a backdoor for surveillance purposes?

    I think it’s crucial to approach this story with a critical eye and not be swayed by sensationalized media reports. We need to look beyond the headlines and consider the complex geopolitical dynamics at play.

    Let’s not jump to conclusions or make assumptions without considering the full context. Instead, let’s try to understand the underlying motivations and factors that led to this incident. Only then can we have a more informed discussion about the implications and potential consequences.