• stebator@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    1 day ago

    iOS & Android should not hide admin/root access from users (device owners). The same was as desktop systems (Windows/macOS/Linux) never hide it. This will allow users to use their own encryption (LUKS,dm-crypt, AES, VeraCrypt and so on) to store application data.

  • extremeboredom@lemmy.world
    link
    fedilink
    English
    arrow-up
    164
    ·
    edit-2
    2 days ago

    This isn’t a backdoor, the bureau says.

    “It isn’t a backdoor because we aren’t calling it one. We named the backdoor Lawful Access, so it’s that, not a backdoor.”

    • WhatAmLemmy@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      edit-2
      1 day ago

      People need to start calling this what it is. Backdoor-ing encryption is backdoor-ing national security. It should be considered nothing less than treason to democracy…

      But we don’t live in democracies. We live in corporate dictatorships masquerading as democracy, so these efforts to destroy our civil liberties make perfect sense.

  • Zak@lemmy.world
    link
    fedilink
    English
    arrow-up
    47
    ·
    2 days ago

    This is a battle big tech cannot afford to lose.

    I don’t like this framing. This is about privacy for all of us, and some of the most important providers of encryption software and encrypted services are nonprofits and small companies.

    • Cocodapuf@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      2 days ago

      The exactly.

      You want something from me, fine. But nothing is free and you may not like my price, and in that case you’re simply out of luck.

  • HappyTimeHarry@lemm.ee
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    2 days ago

    As someone who know pgp exists, i say have at it feds, lets see what kind of explots clippy2.0 has and how quickly it gets cracked.

    Seriously ever actual expert in cryptography would tell then what they want is not possible. It would be exploited within weeks, probably by multiple different actors. Let them fuck around and find out, they obviously dont “learn” from it, but at least it will shut them down for another decade or so.

    • Buckshot@programming.dev
      link
      fedilink
      English
      arrow-up
      28
      ·
      2 days ago

      A great example of this is TSA luggage locks. Mandated backdoor, master keys leaked by company that makes them, now anyone can open any TSA approved lock.

      • JordanZ@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        2 days ago

        I’m not a fan but TSA just cut the locks off previously. Then you’re out the cost of a lock and your bag is open to anybody even without a key. I still use a TSA approved lock but it also has a little indicator on it that turns red if it’s been opened with the TSA key. So at least I know.

        Most luggage isn’t even remotely secure anyway unless you travel with hard cases with latches. The zippers on most bags you can separate with a ball point pen in seconds. Then just grab the zipper and pull it to the other side and it’s sealed again.

  • dblsaiko@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    32
    ·
    2 days ago

    I guess it was wishful thinking that the FBI just learnt their lesson regarding encryption with the Chinese phone line hack. Bastards

  • MynameisAllen@lemm.ee
    link
    fedilink
    English
    arrow-up
    27
    ·
    2 days ago

    Looks like I’ll be happily sticking with grapheneOS until Linux phones get VOLTE working

    • Warl0k3@lemmy.world
      link
      fedilink
      English
      arrow-up
      28
      ·
      2 days ago

      For anyone who doesn’t know who this was, it’s a photo of Ted Kaczynski - the unabomber- a terrorist who over approx. 20 years mailed and placed a series of bombs targeting universities and other technology-focused places and people, killing three and permanently injuring more than a dozen others.

      Posting him here is a reference to his manifesto in which he lays out many grievances against technology and industrialization, including increased ability for governments to surveil their citizens.

    • Basic Glitch@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      2
      ·
      edit-2
      2 days ago

      This dude was a pos bc he hurt so many people for no real reason, but when you read about the stuff he was worried about, it’s eerily accurate. It’s like he crawled inside Peter Thiel’s head, got a glimpse of his plans, and that’s what set him off the deep end.

      Editing to add, he was already in a very vulnerable state mentally when he decided to drop out of society, very likely related to an unethical psychological experiment he “participated” in at Harvard.

      The Technological Society is the book he read while living in the wilderness that actually seemed to inspire his writings.

      Ellul argues that modern society is being dominated by technique, which he defines as a series of means that are established to achieve an end. Technique is ultimately focused on the concept of efficiency. The term “technique” is to be comprehended in its broadest possible meaning as it touches upon virtually all areas of life, including science, automation, but also politics and human relations.

      I mean…

      • fleebleneeble@lemm.ee
        link
        fedilink
        English
        arrow-up
        28
        ·
        edit-2
        2 days ago

        While I don’t fully agree with his methods in terms of he seemed to randomly select people who were otherwise not as much a part of the problem to blow up, why he is “nuts” has a really sad and fucked up reason / origin. He was basically mentally and physically tortured through an academically hosted, governmental project for a long enough time to make anyone lash out respectively.

        • Basic Glitch@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          12
          ·
          edit-2
          2 days ago

          True, and I didn’t mean it in a necessarily derogatory way in terms of judgment for his mental illness, but for his actions. I know I should be more careful about saying things like that, and didn’t mean to imply anything negative about people who struggle with mental illness.

          It’s complicated. Nobody should have had to go through what he did, but something awful somebody went through can’t be used as a justification for them doing something awful to somebody else. It can be the reason they did it, and it may arguably make them not fully responsible for their own behavior, but it also doesn’t make them an innocent.

        • Warl0k3@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          2 days ago

          So did anyone else in the study turn to terrorism to express themselves…?

          • Basic Glitch@lemm.eeOP
            link
            fedilink
            English
            arrow-up
            19
            ·
            edit-2
            2 days ago

            To be fair, he was probably the youngest and most vulnerable participant, and the experiment lasted 3 years. He started attending Harvard at 16, and was probably around 16/17 when the study began.

            They used psychological warfare on a kid who was already socially reserved on top of feeling alienated from his peers due to his age, and likely stressed due to being away from his family and home for the first time in his young life. During a developmental period that we now recognize is probably the most critical window for young men in particular to develop a mental illness like schizophrenia, they did this:

            Subjects were told they would debate personal philosophy with a fellow student and were asked to write essays detailing their personal beliefs and aspirations. The essays were given to an anonymous individual who would confront and belittle the subject in what Murray himself called “vehement, sweeping, and personally abusive” attacks, using the content of the essays as ammunition. Kaczynski spent 200 hours as part of the study.

            Like holy shit…

      • Amnesigenic@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        2
        ·
        2 days ago

        His motives were downright prescient, but his targets were poorly chosen to put it lightly

    • palordrolap@fedia.io
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      2 days ago

      Maybe, but they wouldn’t want to give away that such a thing definitely already exists. Also, any intelligence gathered that way would likely be inadmissible as evidence if it was used to prosecute someone.

      By getting an overt backdoor installed, both those problems go away.

    • melroy@kbin.melroy.org
      link
      fedilink
      arrow-up
      3
      arrow-down
      2
      ·
      2 days ago

      Depends on how good the e2e application is written. But yea, since android is still in the middle of data transfer, as well as IO of storage. Meaning both iOS and android can be the man the in the middle software that is tapping off the data even before it’s getting encrypted.

      Hopefully nobody is reading this from apple or Google, before I give them ideas. 😔

      • MrAlternateTape@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Don’t worry, Google and Apple already know this…but so far we can only hope they will never agree to do something like that.

        And if they do, nobody will know about it anyways.