• naeap@sopuli.xyz
    link
    fedilink
    arrow-up
    22
    ·
    edit-2
    16 days ago

    Well, backdoor for “good actors” is always a backdoor for everyone

    Not like all the privacy groups were shouting that since ever…

    Edit: and how can this still be regarded as E2E, when it’s obviously not?

    “But end-to-end encryption over texts between Apple devices and Android devices, for instance, aren’t encrypted in the same way, meaning they were vulnerable to interception by Salt Typhoon, according to the Times.”

    What is it I don’t understand here?
    If it’s E2E, then nobody could intercept my messages in a meaningful way.
    How is this still possible, when messages went from iOS to Android - or the other way round?
    At least Signal still holds strong, disregarding the OS

    • smokeysnilas@feddit.org
      link
      fedilink
      Deutsch
      arrow-up
      11
      ·
      16 days ago

      I feel E2E has become a marketing term and companies don’t hold the promise e.g. “it’s E2E but one end is your device and the other end is my server”

      • naeap@sopuli.xyz
        link
        fedilink
        arrow-up
        4
        ·
        16 days ago

        Well, that would be really shit and wrong marketing

        Hopefully you’re wrong and this doesn’t take hold :⁠-⁠\

    • RaoulDook@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      16 days ago

      Sounds like normal SMS texting or unencrypted RCS messaging between iOS and Android phones rather than E2EE

      • naeap@sopuli.xyz
        link
        fedilink
        arrow-up
        2
        ·
        16 days ago

        Thanks!

        Never had a RCS conversation and didn’t really look into it.
        Do you’re probably right, that it’s about that.

  • Zacryon@feddit.org
    link
    fedilink
    arrow-up
    6
    ·
    16 days ago

    Summary generated by Copilot, for everyone as lazy as me:

    China-linked hackers, known as Salt Typhoon, infiltrated U.S. telecommunications infrastructure, exploiting systems used for wiretapping Americans in criminal cases. This breach, described as the worst telecom hack in U.S. history, allowed hackers to listen to phone calls and read text messages. The networks remain compromised, and drastic measures are needed to secure them. The hack targeted fewer than 150 people, mostly in Washington DC, but the actual number of affected individuals could be much higher. Encrypted communications via apps like Signal and iMessage were likely protected.