• DarkCloud@lemmy.world
    link
    fedilink
    English
    arrow-up
    39
    ·
    edit-2
    8 days ago

    I love how this is painted as hacking when the root cause is an unrestricted number of telco subsideries that pay for access to the system, this then essentially gives them the powers and credentials to monitor, intercept, and clone anyone’s phone and send/receive their messages/calls (Linus Tech Tips teamed up with Derek from Veritasium to show the extent to which it can be done, stealing his identity to intercept texts to and from his wife).

    This is a product of the market deregulations of Capitalism. Capitalism is once again a security risk to citizens of free democracies. Shit happens all the time.

      • xodoh74984@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        6 days ago

        Gotta love when a comment complaining about something that didn’t happen gets the most upvotes.

        Edit: For those curious about what actually did happen

        Salt Typhoon exploited technical vulnerabilities in some of the cybersecurity products like firewalls used to protect large organizations. Once inside the network, the attackers used more conventional tools and knowledge to expand their reach, gather information, stay hidden and deploy malware for later use.
        Source

        The hack revealed in the Linus video is concerning, but only if you’re a targeted individual. This hack was used for mass surveillance, affected way more people, and was achieved by exploiting security vulnerabilities.

        The technical deep dive is a pretty interesting read.

  • jqubed@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    ·
    8 days ago

    An unnamed FBI official was quoted in the same report as saying that phone users “would benefit from considering using a cellphone that automatically receives timely operating system updates, responsibly managed encryption, and phishing-resistant” multifactor authentication for email accounts, social media, and collaboration tools.

    (Emphasis added)

    I assume by “responsibly managed encryption” they mean something that still has a backdoor, even though backdoors seem to be a significant part of the problem?

    • Uriel238 [all pronouns]@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 days ago

      And will continue to be.

      The industrial espionage sector usually cracks backdoors inside days of first release (unless they find a better exploit).

      That was the point of NSA before 9/11 and the Patriot Act. Before it was completely captured.