this post was submitted on 07 Oct 2024
542 points (99.1% liked)

Technology

59091 readers
4966 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 44 comments
sorted by: hot top controversial new old
[–] [email protected] 330 points 4 weeks ago (2 children)

Wow. It's almost like we've been warning for years that putting backdoors into software, systems, and encryption would allow nefarious parties to exploit them.

[–] [email protected] 141 points 4 weeks ago (4 children)

Think about the children . It will make it easier for police to access instead of doing actual police work and getting a warrant.

[–] [email protected] 55 points 4 weeks ago (1 children)

Well yeah but then they'd have to expand the hiring pool beyond the dumbest jock you knew in high school and those people tend to balk at doing fascism so...

[–] [email protected] 31 points 4 weeks ago

Hey, be fair! They also hire the three bullies who hung out by the bleachers smoking cigarettes.

[–] [email protected] 13 points 4 weeks ago

Sorry, I only think of children during school shootings, it's easier that way.

[–] [email protected] 2 points 4 weeks ago

you don't want police to think about children, or atleast I don't.

[–] [email protected] 26 points 4 weeks ago (1 children)

The FBI is the nefarious party lol

[–] [email protected] 1 points 4 weeks ago

Waco intensifies

[–] [email protected] 149 points 4 weeks ago* (last edited 4 weeks ago) (3 children)

~~China~~ USA hacked Verizon, AT&T and Lumen then left the door open for anybody else

[–] [email protected] 67 points 4 weeks ago

If the door exists, then it can be opened

[–] [email protected] 48 points 4 weeks ago (1 children)

And this is why the NSA is supposed to close exploits rather than harvest them for surveillance.

This is why surveillance backdoors are always bad, and you can't math around that.

[–] [email protected] 4 points 4 weeks ago

Can't weasel around math you mean? They don't think they can, it's collateral damage.

[–] [email protected] 127 points 4 weeks ago (1 children)

What?? But the FBI called dibs on that backdoor! /s

It's almost like putting backdoors into software as a whole is a bad idea cause anyone who knows of it can use it, not just "tHe GoOd GuYs"

[–] [email protected] 4 points 4 weeks ago

cause anyone who knows of it can use it

…and the ones who don't know of it will one day become the ones who know

[–] [email protected] 72 points 4 weeks ago

Omg the back doors work for anyone who can gain access to them??? Shocked-pikachu.jpg

[–] [email protected] 69 points 4 weeks ago (2 children)

This article is getting saved, for the next time some idiot proposes 'lawful backdoors', which will inevitably happen.

[–] [email protected] 34 points 4 weeks ago (1 children)

Nervously glances at TPM and TSA approved locks.

[–] [email protected] 26 points 4 weeks ago (4 children)

I still love the fact that those TSA keys are all available online as 3D files and likely as metal as well

[–] [email protected] 4 points 4 weeks ago

I know for a fact you can get a metal set for a few dollars plus shipping.

[–] [email protected] 2 points 4 weeks ago (2 children)

Those locks are kinda optional. And luggage is way less important than all of one's communication ; imho.

[–] [email protected] 8 points 4 weeks ago

Oh absolutely, but it does do something that I'm not sure people realize: it normalizes the idea of a government agent holding the keys to all of your stuff.

[–] [email protected] 2 points 4 weeks ago

The bad part is when people take a luggage lock and use it for their Gym locker, or the locker at the pool. Somewhere that really REALLY shouldn't be using a weak lock with a readily available master key.

[–] [email protected] 2 points 4 weeks ago

I just went and looked, set of multiple TSA master keys for sale online, numbered with which ones they are the master keys for.

[–] [email protected] 45 points 4 weeks ago (2 children)

I remember them trying to get Apple to put in a back door as well

[–] [email protected] 21 points 4 weeks ago (2 children)

Only Apple can use that data for profit! Now the Alphabet agencies just buy that data from brokers..... I just realized how funny the parent company to Google name change is.

[–] [email protected] 4 points 4 weeks ago

Dang, you're right! It's like noticing the arrow in fedex

[–] [email protected] 1 points 4 weeks ago (1 children)

I just realized how funny the parent company to Google name change is.

Thank you for this sentence, I thought you were talking about Google, YouTube, etc at first

[–] [email protected] 1 points 4 weeks ago

At least they were not talking about Lemmy, Mastodon, etc. like someone is trying to screw up the Fediverse.

[–] [email protected] 2 points 4 weeks ago

That was a psyop my man

Got normies super comfortable ;)

[–] [email protected] 37 points 4 weeks ago (4 children)

Article author struggles with clean links

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack btw

The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel,

That's interesting. Must be a coincidence.

and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:

"Don't worry, guys we tried to backdoor all devices but failed, see?"

Meanwhile, Intel ME, AMD "Secure Processor", and ARM "TrustZone":

[–] [email protected] 4 points 4 weeks ago

That’s interesting. Must be a coincidence.

Kinda coincides in time with Israel becoming less of a normal West-aligned state and more of a spoiled child whom everyone pats, not very well-behaving at that.

Though TBH this was the case under Reagan too. It's just that there's difference between support for Israel and Israel's penetration back.

[–] [email protected] 4 points 4 weeks ago (2 children)

That link is a 404 for me.

[–] [email protected] 3 points 4 weeks ago

Same. The OP article is interesting, but was hoping for more than a few wiki links of past instances. Is there more verifiable evidence for this instance? Don't doubt the claim, just curious.

[–] [email protected] -1 points 4 weeks ago* (last edited 4 weeks ago)

Dawg

Edit: y'all no fun

[–] [email protected] 1 points 4 weeks ago* (last edited 4 weeks ago)

I think you should watch this Great Video by CCC,de on Intel ME it has some great facts and information on the deal with IntelME without all the fearmongering and conspiracy theories other videos and blogs usually pump out.

[–] [email protected] 22 points 4 weeks ago

Can't buy Huawei Networking gear, if we get hacked it has the be through our own backdoor.

[–] [email protected] 2 points 4 weeks ago

@db0 works as intended

[–] [email protected] 1 points 4 weeks ago

nice, that'll tech them.