this post was submitted on 30 May 2025
360 points (98.6% liked)

Technology

70995 readers
3303 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 40 comments
sorted by: hot top controversial new old
[–] extremeboredom@lemmy.world 171 points 1 week ago* (last edited 1 week ago) (3 children)

This isn't a backdoor, the bureau says.

"It isn't a backdoor because we aren't calling it one. We named the backdoor Lawful Access, so it's that, not a backdoor."

[–] whotookkarl@lemmy.world 2 points 5 days ago

It's not a back door, it's just a rear entryway

[–] Labtec6@lemmy.world 63 points 1 week ago

Same difference between "quotas" and "performance goals".

[–] KairuByte@lemmy.dbzer0.com 16 points 1 week ago

It’s not a back door, it’s a side door!

[–] hydrashok@sh.itjust.works 71 points 1 week ago (1 children)

The FBI can go fuck themselves.

[–] WhatAmLemmy@lemmy.world 12 points 1 week ago* (last edited 1 week ago)

People need to start calling this what it is. Backdoor-ing encryption is backdoor-ing national security. It should be considered nothing less than treason to democracy...

But we don't live in democracies. We live in corporate dictatorships masquerading as democracy, so these efforts to destroy our civil liberties make perfect sense.

[–] knighthawk0811@lemmy.world 59 points 1 week ago

how about no

[–] Zak@lemmy.world 49 points 1 week ago (1 children)

This is a battle big tech cannot afford to lose.

I don't like this framing. This is about privacy for all of us, and some of the most important providers of encryption software and encrypted services are nonprofits and small companies.

[–] davel@lemmy.ml 18 points 1 week ago

Yeah, it’s a non sequitur given that those firms have always been constituent parts of the US military-spook-industrial complex.. They DGAF about our actual privacy, though they may prefer that we believe that they care.

[–] Goretantath@lemm.ee 37 points 1 week ago (1 children)

Fuck right off, my data is my own, pay me for it and then maybe we'll talk.

[–] Cocodapuf@lemmy.world 11 points 1 week ago

The exactly.

You want something from me, fine. But nothing is free and you may not like my price, and in that case you're simply out of luck.

[–] 2xsaiko@discuss.tchncs.de 32 points 1 week ago

I guess it was wishful thinking that the FBI just learnt their lesson regarding encryption with the Chinese phone line hack. Bastards

[–] Altomes@lemm.ee 29 points 1 week ago (1 children)

Looks like I'll be happily sticking with grapheneOS until Linux phones get VOLTE working

[–] throwawayacc0430@sh.itjust.works 1 points 1 week ago (1 children)

Good luck with your Graphene OS when they mandate a Clipper Chip into the hardware.

[–] Altomes@lemm.ee 5 points 1 week ago

Well that gives the Foss community 6 years to figure out VOLTE

[–] davel@lemmy.ml 23 points 1 week ago
[–] stebator@lemmy.world 22 points 1 week ago

iOS & Android should not hide admin/root access from users (device owners). The same was as desktop systems (Windows/macOS/Linux) never hide it. This will allow users to use their own encryption (LUKS,dm-crypt, AES, VeraCrypt and so on) to store application data.

[–] HappyTimeHarry@lemm.ee 20 points 1 week ago (1 children)

As someone who know pgp exists, i say have at it feds, lets see what kind of explots clippy2.0 has and how quickly it gets cracked.

Seriously ever actual expert in cryptography would tell then what they want is not possible. It would be exploited within weeks, probably by multiple different actors. Let them fuck around and find out, they obviously dont "learn" from it, but at least it will shut them down for another decade or so.

[–] Buckshot@programming.dev 30 points 1 week ago (2 children)

A great example of this is TSA luggage locks. Mandated backdoor, master keys leaked by company that makes them, now anyone can open any TSA approved lock.

[–] JordanZ@lemmy.world 8 points 1 week ago

I’m not a fan but TSA just cut the locks off previously. Then you’re out the cost of a lock and your bag is open to anybody even without a key. I still use a TSA approved lock but it also has a little indicator on it that turns red if it’s been opened with the TSA key. So at least I know.

Most luggage isn’t even remotely secure anyway unless you travel with hard cases with latches. The zippers on most bags you can separate with a ball point pen in seconds. Then just grab the zipper and pull it to the other side and it’s sealed again.

Kash Patel wants to start arresting dissidents who will be rioting in 2028

[–] untakenusername@sh.itjust.works 9 points 1 week ago (3 children)

don't they already have it?

[–] palordrolap@fedia.io 11 points 1 week ago

Maybe, but they wouldn't want to give away that such a thing definitely already exists. Also, any intelligence gathered that way would likely be inadmissible as evidence if it was used to prosecute someone.

By getting an overt backdoor installed, both those problems go away.

[–] melroy@kbin.melroy.org 1 points 1 week ago (1 children)

Depends on how good the e2e application is written. But yea, since android is still in the middle of data transfer, as well as IO of storage. Meaning both iOS and android can be the man the in the middle software that is tapping off the data even before it's getting encrypted.

Hopefully nobody is reading this from apple or Google, before I give them ideas. 😔

[–] MrAlternateTape@lemm.ee 2 points 1 week ago (1 children)

Don't worry, Google and Apple already know this....but so far we can only hope they will never agree to do something like that.

And if they do, nobody will know about it anyways.

[–] melroy@kbin.melroy.org 1 points 1 week ago

And you also don't know if they are doing this already. So who knows it might be happening already.

[–] shortwavesurfer@lemmy.zip 6 points 1 week ago

Want in one hand and shit in the other and see which one fills up first.

[–] StereoCode@lemmy.world 4 points 1 week ago

Is this just in case anyone was wondering or forgot because yeaaaahdoiii.

[–] just_another_person@lemmy.world 1 points 1 week ago (1 children)

Somebody else will provide the tools to workaround this in no time. Keep wasting our fucking time and money by not understanding technology, world government figures.

[–] WhyJiffie@sh.itjust.works 2 points 1 week ago

aaand those and the usere will be punished when found