this post was submitted on 07 Oct 2024
542 points (99.1% liked)

Technology

59554 readers
3295 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 41 comments
sorted by: hot top controversial new old
[–] chronicledmonocle@lemmy.world 331 points 1 month ago (2 children)

Wow. It's almost like we've been warning for years that putting backdoors into software, systems, and encryption would allow nefarious parties to exploit them.

[–] gaiussabinus@lemmy.world 140 points 1 month ago (4 children)

Think about the children . It will make it easier for police to access instead of doing actual police work and getting a warrant.

[–] anarchrist@lemmy.dbzer0.com 54 points 1 month ago (1 children)

Well yeah but then they'd have to expand the hiring pool beyond the dumbest jock you knew in high school and those people tend to balk at doing fascism so...

[–] Reverendender@sh.itjust.works 31 points 1 month ago

Hey, be fair! They also hire the three bullies who hung out by the bleachers smoking cigarettes.

[–] Lennny@lemmy.world 13 points 1 month ago

Sorry, I only think of children during school shootings, it's easier that way.

[–] desktop_user@lemmy.blahaj.zone 2 points 1 month ago

you don't want police to think about children, or atleast I don't.

[–] BMTea@lemmy.world 26 points 1 month ago (1 children)

The FBI is the nefarious party lol

[–] DogWater@lemmy.world 1 points 1 month ago

Waco intensifies

[–] technocrit@lemmy.dbzer0.com 148 points 1 month ago* (last edited 1 month ago) (2 children)

~~China~~ USA hacked Verizon, AT&T and Lumen then left the door open for anybody else

[–] almost1337@lemm.ee 67 points 1 month ago

If the door exists, then it can be opened

[–] uriel238@lemmy.blahaj.zone 48 points 1 month ago (1 children)

And this is why the NSA is supposed to close exploits rather than harvest them for surveillance.

This is why surveillance backdoors are always bad, and you can't math around that.

[–] rottingleaf@lemmy.world 4 points 1 month ago

Can't weasel around math you mean? They don't think they can, it's collateral damage.

[–] Th4tGuyII@fedia.io 127 points 1 month ago (1 children)

What?? But the FBI called dibs on that backdoor! /s

It's almost like putting backdoors into software as a whole is a bad idea cause anyone who knows of it can use it, not just "tHe GoOd GuYs"

[–] sukhmel@programming.dev 4 points 1 month ago

cause anyone who knows of it can use it

…and the ones who don't know of it will one day become the ones who know

[–] NegativeLookBehind@lemmy.world 73 points 1 month ago

Omg the back doors work for anyone who can gain access to them??? Shocked-pikachu.jpg

[–] Quacksalber@sh.itjust.works 69 points 1 month ago (2 children)

This article is getting saved, for the next time some idiot proposes 'lawful backdoors', which will inevitably happen.

[–] Bytemeister@lemmy.world 34 points 1 month ago (1 children)

Nervously glances at TPM and TSA approved locks.

[–] Gormadt@lemmy.blahaj.zone 26 points 1 month ago (4 children)

I still love the fact that those TSA keys are all available online as 3D files and likely as metal as well

[–] henfredemars@infosec.pub 4 points 1 month ago

I know for a fact you can get a metal set for a few dollars plus shipping.

[–] Draconic_NEO@lemmy.world 2 points 1 month ago

I just went and looked, set of multiple TSA master keys for sale online, numbered with which ones they are the master keys for.

[–] anzo@programming.dev 2 points 1 month ago (2 children)

Those locks are kinda optional. And luggage is way less important than all of one's communication ; imho.

[–] Gormadt@lemmy.blahaj.zone 8 points 1 month ago

Oh absolutely, but it does do something that I'm not sure people realize: it normalizes the idea of a government agent holding the keys to all of your stuff.

[–] Draconic_NEO@lemmy.world 2 points 1 month ago

The bad part is when people take a luggage lock and use it for their Gym locker, or the locker at the pool. Somewhere that really REALLY shouldn't be using a weak lock with a readily available master key.

[–] Amius@pawb.social 45 points 1 month ago (1 children)

I remember them trying to get Apple to put in a back door as well

[–] horse_battery_staple@lemmy.world 20 points 1 month ago (2 children)

Only Apple can use that data for profit! Now the Alphabet agencies just buy that data from brokers..... I just realized how funny the parent company to Google name change is.

Dang, you're right! It's like noticing the arrow in fedex

[–] LunchMoneyThief@links.hackliberty.org 38 points 1 month ago (4 children)

Article author struggles with clean links

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack btw

The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel,

That's interesting. Must be a coincidence.

and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

"Don't worry, guys we tried to backdoor all devices but failed, see?"

Meanwhile, Intel ME, AMD "Secure Processor", and ARM "TrustZone":

[–] rottingleaf@lemmy.world 4 points 1 month ago

That’s interesting. Must be a coincidence.

Kinda coincides in time with Israel becoming less of a normal West-aligned state and more of a spoiled child whom everyone pats, not very well-behaving at that.

Though TBH this was the case under Reagan too. It's just that there's difference between support for Israel and Israel's penetration back.

[–] dan@upvote.au 4 points 1 month ago (2 children)

That link is a 404 for me.

[–] betabob@lemmy.dbzer0.com 3 points 1 month ago

Same. The OP article is interesting, but was hoping for more than a few wiki links of past instances. Is there more verifiable evidence for this instance? Don't doubt the claim, just curious.

[–] Microplasticbrain@lemm.ee -1 points 1 month ago* (last edited 1 month ago)

Dawg

Edit: y'all no fun

[–] Draconic_NEO@lemmy.world 1 points 1 month ago* (last edited 1 month ago)

I think you should watch this Great Video by CCC,de on Intel ME it has some great facts and information on the deal with IntelME without all the fearmongering and conspiracy theories other videos and blogs usually pump out.

[–] aluminium@lemmy.world 22 points 1 month ago

Can't buy Huawei Networking gear, if we get hacked it has the be through our own backdoor.

[–] Laberpferd@sueden.social 2 points 1 month ago

@db0 works as intended

[–] Korkki@lemmy.world 1 points 1 month ago

nice, that'll tech them.