I can’t. I just can’t.

  • XLE@piefed.social
    link
    fedilink
    English
    arrow-up
    65
    ·
    15 hours ago

    “Local” surveillance happening on the same car computer that’s attached to a SIM card.

    Yeah seems safe

    • FauxLiving@lemmy.world
      link
      fedilink
      English
      arrow-up
      36
      ·
      13 hours ago

      It’s local right until the law enforcement gets into Bluetooth range with the right encryption keys to download all of the data for the past year.

        • tal@lemmy.today
          link
          fedilink
          English
          arrow-up
          8
          ·
          10 hours ago

          I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.

          https://www.networkworld.com/article/769321/insurgents-intercept-video-feeds-from-u-s-drones-using-26-software-report-says.html

          Militants in Iraq and Afghanistan have intercepted live video feeds from unmanned U.S. Predator drones using $26 off the shelf software made by a Russian company, says a report in the Wall Street Journal.

          • elephantium@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            8 hours ago

            IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.

            Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.