this post was submitted on 03 May 2026
84 points (100.0% liked)

technology

24350 readers
282 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 5 years ago
MODERATORS
top 29 comments
sorted by: hot top controversial new old
[–] ChaosMaterialist@hexbear.net 22 points 22 hours ago (2 children)

Friendly reminder that China has thoroughly hacked the telecom system through the Police Wiretapping systems in the biggest this-will-have-consequences and :i-told-you-dog: in recent history. Any surveillance system built here is, effectively, the US government building out China's US spying capabilities without them lifting a finger. xinternet :sit-back-and-enjoy:

Is China in the room with us right now?

The US government sure is, and through expert hacking and intelligence infiltration so are the Chinese. So maybe?

Despite sanctions and public exposure, Salt Typhoon continues operating. Recorded Future documented new breaches of five additional telecom firms between December 2024 and January 2025. By August 2025, the FBI confirmed Salt Typhoon had hacked at least 200 companies across 80 countries.

And just to cement this, here's Congress saying the same thing

“They exploited the wiretapping system that our law enforcement agencies rely on under the Communications Assistance for Law Enforcement Act — known as CALEA. These systems became an open door for Chinese intelligence. Salt Typhoon allowed the Chinese operation to track millions of Americans’ locations in real time, record phone calls at will and read our text messages.”

“So how did this happen?” she continued. “Senior national security officials said the breach occurred in large part because telecommunications companies failed to implement rudimentary – rudimentary! — cybersecurity measures. Investigators found legacy equipment not updated in years, router vulnerabilities with patches available for seven years — seven years! — that were never applied, and hackers acquiring credentials through weak passwords.”

More info about the hack.

The trusted transport layer is dead. Salt Typhoon, a Chinese MSS operation active since 2019, compromised nine major U.S. telecom carriers by exploiting fundamental identity failures. One administrator credential controlled 100,000 routers. Patches available since 2018 remained unapplied for years.

The attackers accessed CALEA lawful intercept systems. They surveilled over one million Americans in real time. They intercepted calls and texts of approximately 100 senior government officials.

This is an Identity Failure Layer collapse. The breach required no sophisticated zero-days. It required one over-privileged account, absent MFA, and years of ignored patches. CISOs are misdiagnosing this as telecom-specific. It is not. Every enterprise routes sensitive traffic through compromised networks. The transport layer your organization trusts is hostile terrain. Assume unencrypted communications are intercepted. Assume metadata is logged.

The mandated backdoor built for law enforcement became the adversary's front door.

fell-for-it-again

[–] KuroXppi@hexbear.net 6 points 13 hours ago

Despite sanctions and public exposure, Salt Typhoon continues operating

"The aptly named Salt Typhoon"

rage-cry stop that stop THAAT NOOO WE CALLED TIME OUT

[–] red_giant@hexbear.net 22 points 21 hours ago (1 children)

The mandated backdoor built for law enforcement became the adversary's front door.

Wow just like every expert and half-expert and non-expert who just thought about it for a second predicted. Wow.

[–] ChaosMaterialist@hexbear.net 15 points 19 hours ago

Right?! RIGHT?! NOOOOO

[–] SootySootySoot@hexbear.net 21 points 1 day ago* (last edited 1 day ago) (2 children)

How would this work? If they could work out you were masking your location, then.. VPNs wouldn't be a thing.

Isn't this the equivalent of making it a crime to lie about you doing crime? What does it possibly achieve?

[–] red_giant@hexbear.net 10 points 20 hours ago* (last edited 20 hours ago) (2 children)

IPv8 proposals end up making anonymity pretty difficult.

And there are under-development systems to provide a method of your carrier disclosing information about you, so like your network packets would get some kind of tag added to them that can be used to query your rough location, age, and potentially other stuff like payment processing. Right now it’s opt-in, eg “do you want to verify you’re 18?”, but that will change as soon as it’s widespread.

[–] TheMadBeagle@hexbear.net 2 points 8 hours ago* (last edited 8 hours ago)

May I ask you to see the reply by Moidialectica@hexbear.net below and make an edit to specify that your reply is based off a unvetted proposal and the proposal should likely not to be taken seriously. I just want to make sure we don't cause panic over misinformation. I would really appreciate this.

[–] Moidialectica@hexbear.net 4 points 19 hours ago (2 children)
[–] TheMadBeagle@hexbear.net 1 points 8 hours ago (1 children)

You should look at the reply by Moidialectica@hexbear.net below. It is an unvetted proposal standard to the IETF that should not be taken seriously.

[–] Moidialectica@hexbear.net 2 points 6 hours ago

that's me tee hee

[–] red_giant@hexbear.net 12 points 18 hours ago* (last edited 18 hours ago) (2 children)

It’s still an early draft.

You can view it as the proposed successor to IPv6, but really it’s more of an extension to IPv4.

Put simply, IPv6 is beginning to be seen as a failure, so IPv8 looks at why IPv6 adoption is still so poor and proposes something else.

IPv8 is backwards compatible with IPv4 (IPv4 becomes a subset of IPv8) which should help adoption since there’s no grand switch-over day like IPv6 requires.

But it also includes a bunch of other stuff, including the idea that every single network element has an identity. So, like, your router can identify itself in a verifiable manner to your ISP by using a JWT.

This allows some good things, for example right now it’s a flaw in the internet that you often have to simply trust an IP address for important data. Like a router can advertise routes and currently your home network trusts your ISP for routes because somewhere in your router there is a static IP assigned and your home router will just trust that IP…. Stuff like this which leaves a lot of infra open to attack such as spoofing or man in the middle stuff.

In IPv8 your router can now verify the identity of who is actually talking to it. This is good, but the downside is that it makes it much more difficult to be anonymous since traffic is now deeply identifiable.

It also allows for every single network element to be uniquely addressable. Under IPv4, typically there is port mapping so the public internet sees “you” as your ISP, but under IPv8 it’s proposed to make every single network element directly addressable by IP, identity, and DNS8. This also enables cool things like potentially you could have asynchronous communication without needing to keep a socket open and dealing with port exhaustion but it also means you’re much less anonymous than under IPv4.

It’s probably moot anyway since these days your ISP and every server / router in the middle is maintaining detailed access logs anyway so your anonymity is already gone, but it makes it much simpler to deanonymize and potentially even undermines stuff like using a VPN by creating many more vectors by which a VPN can leak identity.

[–] TheMadBeagle@hexbear.net 1 points 8 hours ago

May I ask you to see the reply by Moidialectica@hexbear.net below and make an edit to specify that your reply is based off a unvetted proposal and the proposal should likely not to be taken seriously. I just want to make sure we don't cause panic over misinformation. I would really appreciate this.

[–] Moidialectica@hexbear.net 7 points 13 hours ago (1 children)

Are you talking about this ipv8 proposal? From what I know this was a false submission

https://www.ietf.org/archive/id/draft-thain-ipv8-00.html

The video where I first learnt it: https://www.youtube.com/watch?v=7YPnh6dlyQQ

[–] HexReplyBot@hexbear.net 1 points 13 hours ago

I found a YouTube link in your comment. Here are links to the same video on alternative frontends that protect your privacy:

[–] queermunist@lemmy.ml 12 points 23 hours ago* (last edited 23 hours ago)

They'll possibly find out when they search phones and computers of suspects while looking for other evidence.

[–] DragonBallZinn@hexbear.net 19 points 1 day ago

frothingfash: “That’ll show those PERVERTS for daring to not share more data with porky! Nothing to hide nothing to fear….now repeat after me. I love freedom!”

[–] peeonyou@hexbear.net 49 points 1 day ago (2 children)

they're actively trying to destroy the only means of dissent that anyone has left

[–] invalidusernamelol@hexbear.net 46 points 1 day ago (3 children)

Well, the only non-revolutionary means of dissent.

[–] peeonyou@hexbear.net 30 points 1 day ago

yikes, yeah good correction

[–] tamagotchicowboy@hexbear.net 7 points 1 day ago

No such thing, there's always a bypass

[–] Le_Wokisme@hexbear.net 41 points 1 day ago (1 children)

the US government didn't kill enough mormons

somebody else would do this a little later and for less scapegoatable reasons, but yeah the cult should've been eradicated.

[–] JoeByeThen@hexbear.net 36 points 1 day ago (2 children)

Learn to hack, learn to quadcopter/drone.

[–] 9to5@hexbear.net 30 points 1 day ago (1 children)

learn to enrich weapons grade uranium.

[–] Maeve@kbin.earth 8 points 1 day ago

This right here

[–] Homer_Simpson@hexbear.net 8 points 1 day ago (1 children)

But all the flight computers are made in China and out of stock!

[–] JoeByeThen@hexbear.net 9 points 1 day ago

I feel ya. But also, buy shit used, yo! less paperwork. And, we're entering a point where we need to learn to make do with less. Reuse shit. learn to use all those arduinos and esp32s/8266s laying around.