this post was submitted on 02 Sep 2025
176 points (98.4% liked)

News

32233 readers
3470 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious right or left wing sources will be removed at the mods discretion. Supporting links can be added in comments or posted seperately but not to the post body.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source.


Posts which titles don’t match the source won’t be removed, but the autoMod will notify you, and if your title misrepresents the original article, the post will be deleted. If the site changed their headline, the bot might still contact you, just ignore it, we won’t delete your post.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials or celebrity gossip is allowed. All posts will be judged on a case-by-case basis.


7. No duplicate posts.


If a source you used was already posted by someone else, the autoMod will leave a message. Please remove your post if the autoMod is correct. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners.


The auto mod will contact you if a link shortener is detected, please delete your post if they are right.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 2 years ago
MODERATORS
top 17 comments
sorted by: hot top controversial new old
[–] boydster@sh.itjust.works 46 points 1 week ago (1 children)

Seems like obvious 4th and 5th amendment violations at the very least, but I guess that is the style of the time

[–] KIKILOVE@piefed.social 11 points 1 week ago* (last edited 1 week ago) (1 children)

Imagine spending that much money and time to catch Julio who just want to work as a plummer

[–] avidamoeba@lemmy.ca 3 points 1 week ago

They spend the money to find something on Zohran while catching 10 Julios.

[–] Ok_imagination@lemmy.world 37 points 1 week ago (1 children)
[–] SGGeorwell@lemmy.world 7 points 1 week ago (1 children)
[–] Balaquina@lemmy.ca 7 points 1 week ago (1 children)
[–] SGGeorwell@lemmy.world 4 points 1 week ago (1 children)

Yikes my guy. Even the worst coffee is better than the best covfefe.

[–] Stovetop@lemmy.world 3 points 1 week ago

Covfefe will be all that the US will have access to if the tariffs on all the big coffee-producing countries continues.

[–] mlg@lemmy.world 20 points 1 week ago (1 children)

It's a Pegasus clone from a different Israeli firm that started the process of selling it to the DEA in 2023.

The funny thing is the NSA probably has its own, superior, in-house system for the same type of stuff, but they don't give it out to other branches or even claim they have such a toolkit, because they use it exclusively for whatever is deemed a serious threat, like proper foreign adversaries or people they think might be spies (or people like Snowden)

Which is why groups like ICE or the FBI have to procure or create their own.

Of course if anyone remembers how NSO basically sold Pegasus to thugs and gang leaders like in Mexico, you bet bet your ass some poor schmuck is gonna get targeted by ICE for making comments online like this one (lol).

Starting to reach the point where it's time to jump ship from clearnet and go full stealth on p2p stuff like tor and i2p. Won't be long before they come knocking on any websites door for account info, ip logs, and any stored websites because you posted a roasted Vance meme online.

[–] ISOmorph@feddit.org 7 points 1 week ago* (last edited 1 week ago) (2 children)

Isn't tor super dodgy because anyone, even the government, can host exit nodes? Honest question, I haven't read too much about it.

[–] twice_hatch@midwest.social 7 points 1 week ago

It's true that a large adversary with a little money (like the US or Israeli government) could host a huge amount of compromised exit nodes and relays (I don't think compromising exit nodes alone is enough) and de-anonymize users.

It is also true that you can run a relay right now by running the Snowflake proxy in a normal browser tab: https://snowflake.torproject.org/

It is safe to run a relay on your home connection, because you aren't hosting any exit traffic. I've never had trouble when I've done it.

Tor also hosts "hidden services" or "onion services", which don't exit the Tor network. The client and the server agree on a rendezvous node and meet each other there, and the traffic is encrypted from end-to-end. I am pretty secure this is more resistant to the "global passive adversary" type of attack, but nothing is perfect. A GPA can always look at timing and make some correlations based off of it.

It is true that the network is more secure if more people use it, because that provides cover. It is true that if you pirate stuff through I2P you won't get a letter from your ISP.

Better practice now before you really need it.

[–] mlg@lemmy.world 4 points 1 week ago (1 children)

The other comment already pointed this out better, but yeah tor and i2p as a concept use onion routing which if you utilize correctly, won't de-anonymize you if a government runs exit nodes, since they won't know where that traffic is originating from*

*big disclaimer is that you must ensure your tor/i2p traffic itself is clear of identification. There'd be no purpose in logging into your personal gmail since anyone with access to that info could easily identify that its you. Lots of people have been caught simply because they performed bad opsec and did not separate their clearnet and darknet activities (ex: Ross Ulbricht advertised his silk road with his regular old gmail on a forum with his real name).

The systemic threat to Tor and i2p is if a government is able to influence the routing algorithm or create enough tor nodes that the routing guarantees a path through controlled nodes where traffic can be de-anonymized via logistical analysis (Sybil attack). This is significantly harder to accomplish but not impossible. Tor particularly has been hit with recent attacks that successfully de-anonymized hidden servers by poisoning the route algorithm. Even though Tor nodes are decentralized, the routing map is not (controlled by a handful of route authorized servers) which was done to protect against the Sybil attack specifically by dropping known bad nodes, though it has become controversial since it clearly didn't protect against certain attacks.

i2p is theory is supposed to be better due to its complete decentralized nature and advanced garlic routing, but successful attacks have been demonstrated in a lab environment.

Still, both darknets become stronger just by having more users to mix all the traffic and make it more difficult to de-anonymize

The other annoying issue which i2p actually does solve quite well compared to Tor is speed. Darknets are notoriously slow due to their hefty routing to ensure anonymity. i2p improves this with its garlic routing, but its still feels like you're running on a congested DSL line from 1999.

[–] Illecors@lemmy.cafe 2 points 1 week ago

For anyone curious and willing to try a safe website - lemmy.cafe is also served on tor.

https://lemmy.cafe/post/22287795

[–] aramis87@fedia.io 7 points 1 week ago (1 children)

When it is successfully deployed against a target, the hacking software – called Graphite – can hack into any phone. By essentially taking control of the mobile phone, the user – in this case, Ice – can not only track an individual’s whereabouts, read their messages, look at their photographs, but also open and read information held on encrypted applications, like WhatsApp or Signal. Spyware like Graphite can also be used as a listening device, through the manipulation of the phone’s recorder.

From this article

Apple confirms to us that the zero-click attack deployed in these cases was mitigated as of iOS 18.3.1 and has assigned the vulnerability CVE-2025-43200.

From this article

WhatsApp discovered and mitigated an active Paragon zero-click exploit [...] We forensically analyzed multiple Android phones belonging to Paragon targets in Italy (an acknowledged Paragon user) who were notified by WhatsApp. We found clear indications that spyware had been loaded into WhatsApp, as well as other apps on their devices.

Ugh.

[–] AlecSadler@lemmy.blahaj.zone 1 points 1 week ago

Hmm struggling to find S25U fix.

Maybe I'll get an iPhone.

[–] henfredemars@infosec.pub 6 points 1 week ago

What a waste of such high technology. Literally they don't have a better application for these bugs?

[–] Doorbook@lemmy.world 5 points 1 week ago

If they use weapon and twisted words and logic to kill innocent children men and women, why you think they will care about you?