34 points
*

I love how this is painted as hacking when the root cause is an unrestricted number of telco subsideries that pay for access to the system, this then essentially gives them the powers and credentials to monitor, intercept, and clone anyone’s phone and send/receive their messages/calls (Linus Tech Tips teamed up with Derek from Veritasium to show the extent to which it can be done, stealing his identity to intercept texts to and from his wife).

This is a product of the market deregulations of Capitalism. Capitalism is once again a security risk to citizens of free democracies. Shit happens all the time.

permalink
report
reply
9 points

That’s not what’s happening here, though.

permalink
report
parent
reply
2 points
*

Gotta love when a comment complaining about something that didn’t happen gets the most upvotes.

Edit: For those curious about what actually did happen

Salt Typhoon exploited technical vulnerabilities in some of the cybersecurity products like firewalls used to protect large organizations. Once inside the network, the attackers used more conventional tools and knowledge to expand their reach, gather information, stay hidden and deploy malware for later use.
Source

The hack revealed in the Linus video is concerning, but only if you’re a targeted individual. This hack was used for mass surveillance, affected way more people, and was achieved by exploiting security vulnerabilities.

The technical deep dive is a pretty interesting read.

permalink
report
parent
reply
3 points

The hacker known as “capitalism”

permalink
report
parent
reply
26 points

Good thing banks use sms for two factor codes

permalink
report
reply
18 points

An unnamed FBI official was quoted in the same report as saying that phone users “would benefit from considering using a cellphone that automatically receives timely operating system updates, responsibly managed encryption, and phishing-resistant” multifactor authentication for email accounts, social media, and collaboration tools.

(Emphasis added)

I assume by “responsibly managed encryption” they mean something that still has a backdoor, even though backdoors seem to be a significant part of the problem?

permalink
report
reply
22 points

I don’t want the encryption equivalent of a TSA approved luggage lock.

permalink
report
parent
reply

And will continue to be.

The industrial espionage sector usually cracks backdoors inside days of first release (unless they find a better exploit).

That was the point of NSA before 9/11 and the Patriot Act. Before it was completely captured.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 15K

    Monthly active users

  • 6.7K

    Posts

  • 153K

    Comments