this post was submitted on 30 May 2025
347 points (98.6% liked)

Technology

71517 readers
4392 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 37 comments
sorted by: hot top controversial new old
[–] extremeboredom@lemmy.world 161 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

This isn't a backdoor, the bureau says.

"It isn't a backdoor because we aren't calling it one. We named the backdoor Lawful Access, so it's that, not a backdoor."

[–] Labtec6@lemmy.world 61 points 2 weeks ago

Same difference between "quotas" and "performance goals".

[–] KairuByte@lemmy.dbzer0.com 16 points 2 weeks ago

It’s not a back door, it’s a side door!

[–] whotookkarl@lemmy.world 2 points 2 weeks ago

It's not a back door, it's just a rear entryway

[–] hydrashok@sh.itjust.works 69 points 2 weeks ago (1 children)

The FBI can go fuck themselves.

[–] WhatAmLemmy@lemmy.world 12 points 2 weeks ago* (last edited 2 weeks ago)

People need to start calling this what it is. Backdoor-ing encryption is backdoor-ing national security. It should be considered nothing less than treason to democracy...

But we don't live in democracies. We live in corporate dictatorships masquerading as democracy, so these efforts to destroy our civil liberties make perfect sense.

[–] knighthawk0811@lemmy.world 56 points 2 weeks ago

how about no

[–] Zak@lemmy.world 48 points 2 weeks ago

This is a battle big tech cannot afford to lose.

I don't like this framing. This is about privacy for all of us, and some of the most important providers of encryption software and encrypted services are nonprofits and small companies.

[–] Goretantath@lemm.ee 36 points 2 weeks ago (1 children)

Fuck right off, my data is my own, pay me for it and then maybe we'll talk.

[–] Cocodapuf@lemmy.world 11 points 2 weeks ago

The exactly.

You want something from me, fine. But nothing is free and you may not like my price, and in that case you're simply out of luck.

[–] 2xsaiko@discuss.tchncs.de 32 points 2 weeks ago

I guess it was wishful thinking that the FBI just learnt their lesson regarding encryption with the Chinese phone line hack. Bastards

[–] Altomes@lemm.ee 29 points 2 weeks ago (1 children)

Looks like I'll be happily sticking with grapheneOS until Linux phones get VOLTE working

[–] throwawayacc0430@sh.itjust.works 1 points 2 weeks ago (1 children)

Good luck with your Graphene OS when they mandate a Clipper Chip into the hardware.

[–] Altomes@lemm.ee 5 points 2 weeks ago

Well that gives the Foss community 6 years to figure out VOLTE

[–] stebator@lemmy.world 22 points 2 weeks ago

iOS & Android should not hide admin/root access from users (device owners). The same was as desktop systems (Windows/macOS/Linux) never hide it. This will allow users to use their own encryption (LUKS,dm-crypt, AES, VeraCrypt and so on) to store application data.

[–] HappyTimeHarry@lemm.ee 20 points 2 weeks ago (1 children)

As someone who know pgp exists, i say have at it feds, lets see what kind of explots clippy2.0 has and how quickly it gets cracked.

Seriously ever actual expert in cryptography would tell then what they want is not possible. It would be exploited within weeks, probably by multiple different actors. Let them fuck around and find out, they obviously dont "learn" from it, but at least it will shut them down for another decade or so.

[–] Buckshot@programming.dev 30 points 2 weeks ago (2 children)

A great example of this is TSA luggage locks. Mandated backdoor, master keys leaked by company that makes them, now anyone can open any TSA approved lock.

[–] JordanZ@lemmy.world 8 points 2 weeks ago

I’m not a fan but TSA just cut the locks off previously. Then you’re out the cost of a lock and your bag is open to anybody even without a key. I still use a TSA approved lock but it also has a little indicator on it that turns red if it’s been opened with the TSA key. So at least I know.

Most luggage isn’t even remotely secure anyway unless you travel with hard cases with latches. The zippers on most bags you can separate with a ball point pen in seconds. Then just grab the zipper and pull it to the other side and it’s sealed again.

[–] DoucheBagMcSwag@lemmy.dbzer0.com 14 points 2 weeks ago

Kash Patel wants to start arresting dissidents who will be rioting in 2028

[–] untakenusername@sh.itjust.works 9 points 2 weeks ago (3 children)

don't they already have it?

[–] palordrolap@fedia.io 11 points 2 weeks ago

Maybe, but they wouldn't want to give away that such a thing definitely already exists. Also, any intelligence gathered that way would likely be inadmissible as evidence if it was used to prosecute someone.

By getting an overt backdoor installed, both those problems go away.

[–] melroy@kbin.melroy.org 1 points 2 weeks ago (1 children)

Depends on how good the e2e application is written. But yea, since android is still in the middle of data transfer, as well as IO of storage. Meaning both iOS and android can be the man the in the middle software that is tapping off the data even before it's getting encrypted.

Hopefully nobody is reading this from apple or Google, before I give them ideas. 😔

[–] MrAlternateTape@lemm.ee 2 points 2 weeks ago (1 children)

Don't worry, Google and Apple already know this....but so far we can only hope they will never agree to do something like that.

And if they do, nobody will know about it anyways.

[–] melroy@kbin.melroy.org 1 points 2 weeks ago

And you also don't know if they are doing this already. So who knows it might be happening already.

[–] shortwavesurfer@lemmy.zip 6 points 2 weeks ago

Want in one hand and shit in the other and see which one fills up first.

[–] StereoCode@lemmy.world 4 points 2 weeks ago

Is this just in case anyone was wondering or forgot because yeaaaahdoiii.

[–] just_another_person@lemmy.world 1 points 2 weeks ago (1 children)

Somebody else will provide the tools to workaround this in no time. Keep wasting our fucking time and money by not understanding technology, world government figures.

[–] WhyJiffie@sh.itjust.works 2 points 2 weeks ago

aaand those and the usere will be punished when found