- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
As if anybody here needs a reason to be wary of what you do online, this essay shares how a foreign adversary used back doors that were intentionally put in place to spy on Americans and how the rest of the world probably has the same back doors.
I especially appreciate the phrase “nerd harder” and the quote, “The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia”.
How can IT folk help politicans to understand?
China’s so bad they’ll sneakily do what your own government does right in front of your face 😱 /s
OTHER PEOPLE CAN USE DOORS???
It turns out surveillance capitalism was the fox in the hen house all along. Who woulda thunk?
NOTE: I consider the secret police (aka “intelligence” agencies) and the revolving door between their multi-billion dollar contractors a core tenet of, and intrinsic to, surveillance capitalism… because why split hairs when they’re all coordinating to attack our civil liberties?
What’s the outrage? Those backdoors were made for governmental use. The only thing is that it was not made for foreign government use, but hey, that is just due to the incompetence of those who designed the backdoor…
So the blunders of US agencies did harm to millions of people. Lawsuits, anyone?
No outrage, just a reminder to encrypt, VPN or whatever to protect yourself from surveillance.
I don’t like your phrase, “incompetence of those who designed the backdoor”. I was not in the room, but in my mind, the execs said “build a back door for the govn’t” and the engineers said “you can’t do that JUST for one party” then the execs said “do it anyways or get fired, we’re getting fistfulls of cash to do it” and the engineers said “I enjoy feeding my family, it’s your company anyways” and did it.
IIRC the backdoor design and keys came from the agencies, not the companies.
Eh?
You can’t build an unpickable back door into a computer system.
You can’t break encryption for only the good guys.
The path to hell is paved with good intentions.
Encryption only works when there is one decryption key. If there are two different keys then it isn’t encrypted bad actors will find a way in
That is 100% correct. Nonetheless, the US agencies assumed that they were smarter than basically all of the security community and common sense.
The path to hell is paved with good intentions.
except the intentions.werent good either.
whenever you encrypt something, encrypt with both the intended public key and the fbi’s public key. and send the one encrypted with the fbi’s key to the fbi.
insists on engineering a security exploit into the software
exploit gets exploited
surprisedpikachu.jpg
I’m not surprised to hear about the alleged hacking incident involving Verizon, AT&T, and Lumen. However, I think it’s essential to take a step back and consider the motivations behind such actions.
Why would China, or any other country, go to such great lengths to hack into these companies? Is it simply a matter of malicious intent, or is there something more at play? Perhaps it’s a response to the increasing scrutiny and pressure being applied to Chinese companies operating in the US.
It’s also worth considering the role of the FBI’s backdoor in this incident. Was it a vulnerability that was exploited, or was it a deliberate attempt to create a backdoor for surveillance purposes?
I think it’s crucial to approach this story with a critical eye and not be swayed by sensationalized media reports. We need to look beyond the headlines and consider the complex geopolitical dynamics at play.
Let’s not jump to conclusions or make assumptions without considering the full context. Instead, let’s try to understand the underlying motivations and factors that led to this incident. Only then can we have a more informed discussion about the implications and potential consequences.
Is your whole thing just writing shit-tier comments with an LLM?