Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Iphone Privacy Security Apple

Chinese Hack of US ISPs Show Why Apple Is Right About Backdoors (9to5mac.com) 119

Alypius shares a report from 9to5Mac: It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What's notable about the attack is that it compromised security backdoors deliberately created to allow for wiretaps by US law enforcement. [...] Apple famously refused the FBI's request to create a backdoor into iPhones to help access devices used by shooters in San Bernardino and Pensacola. The FBI was subsequently successful in accessing all the iPhones concerned without the assistance it sought.

Our arguments against such backdoors predate both cases, when Apple spoke out on the issue in the wake of terrorist attacks in Paris more than a decade ago: "Apple is absolutely right to say that the moment you build in a backdoor for use by governments, it will only be a matter of time before hackers figure it out. You cannot have an encryption system which is only a little bit insecure any more than you can be a little bit pregnant. Encryption systems are either secure or they're not -- and if they're not then it's a question of when, rather than if, others are able to exploit the vulnerability."

This latest case perfectly illustrates the point. The law required ISPs to create backdoors that could be used for wiretaps by US law enforcement, and hackers have now found and accessed them. Exactly the same would be true if Apple created backdoors into iPhones.

This discussion has been archived. No new comments can be posted.

Chinese Hack of US ISPs Show Why Apple Is Right About Backdoors

Comments Filter:
  • by Freischutz ( 4776131 ) on Thursday October 10, 2024 @06:03AM (#64853235)

    Chinese Hack of US ISPs Show Why Apple Is Right About Backdoors

    Apple right about something?!?!?! ... I'VE FOUND A HERETIC!!! BUURRRN HIM!!!!

    • Relax, a little more looking into this will probably show apple to be wrong yet again.
      • by thomst ( 1640045 )

        Posting to undo accidental downmod of parent.

        (I meant to mod it +1 Funny ... )

      • Don't have to look far.

        Apple made claims of an unlock tool leading to orwellian society. [slashdot.org] Never mind that with the current system they have in-place for signing firmwares for installation [theapplewiki.com], the use of the device's unique ids [theapplewiki.com], and a nonce [theapplewiki.com], Apple has so much control over an iOS device that they can individually target a unique device and limit the firmware it is allowed to install to a specific installation attempt. Not only would this have made the San Bernardino case irrelevant, as at this point creating a
        • Don't have to look far.

          Apple made claims of an unlock tool leading to orwellian society. [slashdot.org] Never mind that with the current system they have in-place for signing firmwares for installation [theapplewiki.com], the use of the device's unique ids [theapplewiki.com], and a nonce [theapplewiki.com], Apple has so much control over an iOS device that they can individually target a unique device and limit the firmware it is allowed to install to a specific installation attempt. Not only would this have made the San Bernardino case irrelevant, as at this point creating a firmware that only worked on the phone while it was subject to the court ordered search warrant and ensuring it's removal after the search was completed is now possible, but it's the exact type of backdoor that no-one should want in their devices. A factory-made individually-targeted backdoor controlled by others that can be sprung at a moment's notice. I.e. The exact thing that people in the IT industry were hand-wringing over.

          This is just Apple patting itself on the back for it's previous efforts while ignoring the current reality which is far different.

          How, pray tell, was the FBI, or Apple, planning to Initiate an iOS "Update" Sequence, when that Requires the User to both Unlock the Phone, but then actually Manually Enter The Passphrase On that Phone?!?

          Think, Motherfucker, Think!!!

    • by stealth_finger ( 1809752 ) on Thursday October 10, 2024 @08:24AM (#64853407)

      Apple right about something?!?!?! ...

      Only them and pretty much everyone else.

      • by jmccue ( 834797 )
        Not to mention, everytime you execute a program on an Apple PC/Laptop, it phomes home. Plus "Apple right ???". No, everyone who knows a tiny bit about cyper security has been saying this for decades before apple even existed. So all Apple is doing is echoing decades old comments.
        • Not to mention, everytime you execute a program on an Apple PC/Laptop, it phomes home.

          Plus "Apple right ???". No, everyone who knows a tiny bit about cyper security has been saying this for decades before apple even existed. So all Apple is doing is echoing decades old comments.

          1. Only if you want it to.

          2. Does that make them wrong?

    • Apple right about something?!?!?! ... I'VE FOUND A HERETIC!!! BUURRRN HIM!!!!

      Full disclosure: I do not like Apple, Sony, Microsoft, almost all game companies, telecom.

      That said, Apple's stance on back doors is correct. Thus proving the adage that even greedy assholes can be correct when their imperatives are threatened. Apple doesn't want their user base to be hacked and owned.

      That's Apple's job.

      • Apple right about something?!?!?! ... I'VE FOUND A HERETIC!!! BUURRRN HIM!!!!

        Full disclosure: I do not like Apple, Sony, Microsoft, almost all game companies, telecom.

        That said, Apple's stance on back doors is correct. Thus proving the adage that even greedy assholes can be correct when their imperatives are threatened. Apple doesn't want their user base to be hacked and owned.

        That's Apple's job.

        Precisely!

    • Apple still pulled off a masterclass in marketing and redirection. Somehow they prevented anyone from asking the correct question. That correct question is "WHY is it even possible for a company to compromise the users encryption?". That is because they control it and they SHOULD NOT. Encryption plugins should allow the use of any encryption that the user chooses. Not encryption enforced by the creator that has the ability for them to give up the keys to the kingdom. Which encryption, and total control of k

      • Apple still pulled off a masterclass in marketing and redirection. Somehow they prevented anyone from asking the correct question. That correct question is "WHY is it even possible for a company to compromise the users encryption?". That is because they control it and they SHOULD NOT. Encryption plugins should allow the use of any encryption that the user chooses. Not encryption enforced by the creator that has the ability for them to give up the keys to the kingdom. Which encryption, and total control of keys involved should be left to the users. Period. If you aren't controlling your own encryption and encrypting BEFORE it is delivered to any app, consider it compromised.

        Um, I thought you were wrong; so I checked. You are.

        https://support.apple.com/en-u... [apple.com]

        • Apple still pulled off a masterclass in marketing and redirection. Somehow they prevented anyone from asking the correct question. That correct question is "WHY is it even possible for a company to compromise the users encryption?". That is because they control it and they SHOULD NOT. Encryption plugins should allow the use of any encryption that the user chooses. Not encryption enforced by the creator that has the ability for them to give up the keys to the kingdom. Which encryption, and total control of keys involved should be left to the users. Period. If you aren't controlling your own encryption and encrypting BEFORE it is delivered to any app, consider it compromised.

          Um, I thought you were wrong; so I checked. You are.

          https://support.apple.com/en-u... [apple.com]

          Sorry to Reply to myself; but this needed to be added to shut you up:

          https://support.apple.com/en-u... [apple.com]

          Note that, other than "iCloud Mail" and Contacts and Calendars information, whose Open Protocols and Data Formats "do not allow" for Advanced Data Protection (see, also, Notes 1&2 in the above tech support article); the rest of all iCloud Data is end-to-end Encrypted, with the Keys stored On-Device.

          Also note that, even with Standard Protection, many Classes of Data are still protected by On-Device Keys.

  • That's rich... (Score:3, Insightful)

    by Anonymous Coward on Thursday October 10, 2024 @06:05AM (#64853239)

    They're part of PRISM.

    • hah yeah American company subject to American laws. Me thinks they doth protest too much and pose a little too hard :)

      • by Rujiel ( 1632063 )
        What do you think the FISA Amendments Act of 2008 was about, if not retroactive immunity for all the companies who worked with the NSA. Would that have been necessary if it was legal? Herp derp
    • by Rujiel ( 1632063 )
      Yuo, since 2007? According to the slides from Snowden
      • Yuo, since 2007? According to the slides from Snowden

        ONE slide, with an Undated, Scribbled-On "Notation".

        Sorry; not convinced it wasn't added.

    • They're part of PRISM.

      Prove it.

  • nerd harder (Score:5, Insightful)

    by zeiche ( 81782 ) on Thursday October 10, 2024 @06:19AM (#64853257)

    apple can be right all it wants but that won’t change the fact that politicians are know-nothings that don’t give a rat’s ass about weakening security when there is an opportunity for grandstanding and appearing to “do something.”

    • Re:nerd harder (Score:5, Insightful)

      by bradley13 ( 1118935 ) on Thursday October 10, 2024 @06:52AM (#64853293) Homepage

      apple can be right all it wants but that won’t change the fact that politicians are know-nothings that don’t give a rat’s ass about weakening security when there is an opportunity for grandstanding and appearing to “do something.”

      Remember: it's for the children !!

      Seriously, there is no reason at all to provide the government with backdoor access to anything. If the government suspects someone of a crime, they can get a warrant, and compromise one of the endpoints, install hidden surveillance, or whatever. Backdoors led to spying in this case, but how many times has weakened security led to hacking and compromised data? Europe is fighting this battle right now with "chat control".

    • Re:nerd harder (Score:5, Insightful)

      by keithdowsett ( 260998 ) on Thursday October 10, 2024 @07:25AM (#64853331) Homepage

      It's not just the politicians, the journalists are no better. They are happy to use software like Telegram to protect their sources and avoid stories leaking. But when those same tools are used by 'bad people' it's a national scandal and the government needs to do something about it. They don't seem to understand that private communications work both ways.

      As a previous poster noted, the government already has tools which can compromise the endpoints of secure communications, and legal opportunities to install them every time 'bad people' pass through a US airport. There's really no reason to install additional backdoors which can be abused by foreign governments/hackets.

    • by znrt ( 2424692 )

      politicians are just good at doing politics, when they draft laws they don't really need to know squat about the subject, they're just do what they're told to do.

      now, the people who told them about this weren't stupid nor ignorant, they knew full well that these backdoors were a security threat for all, they just considered it as an acceptable drawback and risk if it allowed them to do the dirty little deeds they wanted.

      btw the assumption that apple products don't have backdoors is pretty candid to put it v

  • by pkphilip ( 6861 ) on Thursday October 10, 2024 @07:06AM (#64853301)

    I am not buying Apple's story that they don't have any backdoors on their devices. Why I don't buy that is because there is evidence to indicate that they have secret API which they allow some select companies to use which has only one conceivable purpose - for spying and surveillance. I am referring to this incident when Uber app on Iphone was caught recording screens even when the app wasn't even running on the iphone. Somehow this story just disappeared with next to no followups from the IT security people.

    https://thenextweb.com/news/re... [thenextweb.com]

    Uber came up with a totally B.S explanation for why they were recording screens: "This API isn’t connected to anything in our current codebase, meaning it’s non-functional & there’s no existing feature using it. It was only ever used to render maps for an early version of our Apple Watch app, but has been dormant for quite some time. We are working with Apple to remove it completely ASAP."

    What does recording screens have to do with displaying maps? and why didn't Apple contest this explanation? and how is it that Apple gave this secret entitlement to Uber?

    This incident does show that, at the very least, there was some secret collusion between Apple and Uber to spy on users. And why would this happen unless there was some use case pushed by the surveillance state?

    • if Apple made a deal with Uber then i am sure they are making deals with other companies too,
    • Wasn't exactly secret, it had a name and was in the manifest. Not like they needed to do some obfuscated port knocking to access it.

    • You really should read that article you linked to...

      > It allows developers to read and write to part of the iPhone’s memory that contains pixel and display data.

      write pixel data. For a completely custom renderer it even makes sense.
      Not saying you're wrong to doubt the explanation, just that your doubting doesn't match what is in the article.

      • by jvkjvk ( 102057 )

        And read pixel data, to capture what is currently on the screen, not to render anything.

        What about that?

        • i am sure there are workarounds for that too
        • Yes, that is the problematic part.

          My point was:
          > What does recording screens have to do with displaying maps?

          The fact that the permissions API (wrongly) puts read and write in the same bucket.

    • by flink ( 18449 )

      If the watch didn't yet have a map widget, but did have a display image API, one could hack together a watch map interface by rendering the map on the phone, recording the screen, and transmitting the image to the watch. It's not a conspiracy, just shitty beta software that no one bothered to clean up. Or maybe Uber was doing some underhanded telemetry gathering. Wouldn't put it past them.

      And Apple doesn't have "secret" APIs, they are just undocumented internal use only, reserved for iOS and first party app

      • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Thursday October 10, 2024 @08:27AM (#64853413) Homepage Journal

        And Apple doesn't have "secret" APIs, they are just undocumented internal use only, reserved for iOS and first party apps. Every OS has these.

        Like in every OS except for the most popular kernel on the planet, you mean? And all of the other FOSS options? Or do you mean like what Microsoft was forced to open up to vendors, famously enabling Clownstroke to bring the Windows world to its knees for days?

        Undocumented APIs are there specifically for antitrust, like when it was discovered that Microsoft Office was using one set of functions, and everyone else was using the documented functions which were literally the same functions with delay loops added. And Microsoft's excuse was that those delays were necessary if you didn't know what you were doing, but nobody else knew what they were doing because Microsoft refused to tell them.

        If you believe any different from anyone, including Apple, then you are ignoring how everything works. Operating systems do not need such things at all, not even a tiny bit. Every single interface can and should be completely documented. Anything else is hostility or failure.

        • Like in every OS except for the most popular kernel on the planet, you mean?

          The kernel is not the OS. Literally every OS has undocumented APIs, including that one running the most popular kernel on the planet.

          Or do you mean like what Microsoft was forced to open up to vendors, famously enabling Clownstroke to bring the Windows world to its knees for days?

          Microsoft didn't open up all APIs either. Microsoft was forced to open up specific APIs used by some very specific apps they were using in competition with others, all the while they actually did provide other documented APIs to achieve the same thing. ClownStroke was just that, a shitty company who didn't know what they were doing, using APIs in inappropriate ways interfacing

          • Literally every OS has undocumented APIs, including that one running the most popular kernel on the planet.

            No FOSS OS has undocumented APIs.

            Undocumented APIs are there for many reasons, including internal development reasons.

            Guess what? Putting internal application development above external application development is done specifically for antitrust reasons.

            • Literally every OS has undocumented APIs, including that one running the most popular kernel on the planet.

              No FOSS OS has undocumented APIs.

              So long as there are no Binary BLOBs in the Build. . .

        • by flink ( 18449 ) on Thursday October 10, 2024 @01:22PM (#64854331)

          Let say I've got two shared libraries that ship with an OS. They each have their own public API, but lets say lib A.foo() needs to call some "internal" function in lib B called __os_internal__bar(). B.__os_internal__bar() is an internal implementation detail that is not part of the public, documented API of the OS and is subject to change without notice. However, since it is called by another lib it is an exposed symbol and can technically be called by anyone. Not saying it is good design, just that it happens.

          Now let's say the clock app that ships with the OS, written by a junior dev who is under a time crunch or doesn't know any better, calls B.__os_internal__bar() directly, instead of going through A.foo(). Now we kinda sorta have to preserve it as an "unofficial", "internal" API, but we certainly don't want to encourage it, and we aren't going to sanction 3rd party apps calling it.

          I'm not saying it's never been done for nefarious reasons, but I am saying it is not proof positive of an Apple/Uber/government co-conspiracy as pkphilip immediately jumped to. The most probable explanation is shitty software taking shortcuts and big companies giving each other privileged treatment. I'm not defending it as good, just saying often times it happens by accident or incompetence rather than by design.

          • The most probable explanation is shitty software taking shortcuts and big companies giving each other privileged treatment.

            The latter of those IS ANTITRUST.

            • by flink ( 18449 )

              The most probable explanation is shitty software taking shortcuts and big companies giving each other privileged treatment.

              The latter of those IS ANTITRUST.

              Perhaps. Certainly unethical, but antitrust has a specific legal definition that I am not really qualified to apply to this situation.

              But this thread was not about anti-trust. Specifically I was responding to the allegation in the top post:

              This incident does show that, at the very least, there was some secret collusion between Apple and Uber to spy on users. And why would this happen unless there was some use case pushed by the surveillance state?

              I'm just saying that this is the least likely explanation,

          • Let say I've got two shared libraries that ship with an OS. They each have their own public API, but lets say lib A.foo() needs to call some "internal" function in lib B called __os_internal__bar(). B.__os_internal__bar() is an internal implementation detail that is not part of the public, documented API of the OS and is subject to change without notice. However, since it is called by another lib it is an exposed symbol and can technically be called by anyone. Not saying it is good design, just that it happens.

            Now let's say the clock app that ships with the OS, written by a junior dev who is under a time crunch or doesn't know any better, calls B.__os_internal__bar() directly, instead of going through A.foo(). Now we kinda sorta have to preserve it as an "unofficial", "internal" API, but we certainly don't want to encourage it, and we aren't going to sanction 3rd party apps calling it.

            I'm not saying it's never been done for nefarious reasons, but I am saying it is not proof positive of an Apple/Uber/government co-conspiracy as pkphilip immediately jumped to. The most probable explanation is shitty software taking shortcuts and big companies giving each other privileged treatment. I'm not defending it as good, just saying often times it happens by accident or incompetence rather than by design.

            Finally!!!

            Someone who really has been there; done that!

            A tip o' the hat to you, sir.

    • I am not buying Apple's story that they don't have any backdoors on their devices. Why I don't buy that is because there is evidence to indicate that they have secret API which they allow some select companies to use which has only one conceivable purpose - for spying and surveillance. I am referring to this incident when Uber app on Iphone was caught recording screens even when the app wasn't even running on the iphone. Somehow this story just disappeared with next to no followups from the IT security people.

      https://thenextweb.com/news/re... [thenextweb.com]

      Uber came up with a totally B.S explanation for why they were recording screens: "This API isn’t connected to anything in our current codebase, meaning it’s non-functional & there’s no existing feature using it. It was only ever used to render maps for an early version of our Apple Watch app, but has been dormant for quite some time. We are working with Apple to remove it completely ASAP."

      What does recording screens have to do with displaying maps? and why didn't Apple contest this explanation? and how is it that Apple gave this secret entitlement to Uber?

      This incident does show that, at the very least, there was some secret collusion between Apple and Uber to spy on users. And why would this happen unless there was some use case pushed by the surveillance state?

      Uber has, since its inception, been just one very-small step above a completely criminal organization. They didn't need any help from Apple. And besides; Qui Bono? Certainly not Apple!!!

      Apple likely didn't want to make a big(ger) deal about a serious (and exploited!) vulnerability; and so didn't exactly go on the talk-show circuit to publicize it, especially not before they had a chance to:

      1. Design and Test a Fix.

      2. Scan all existing App Store Apps for signs of similar Exploitation.

      . . .or perhaps that's j

  • Would lawyers be able to use these backdoors imposed by the government, to bring the case to a court and demand compensation for the victims, and sanctions for those responsible for this deliberate weakening of security?

    • by Targon ( 17348 )

      How about taking China to task, give all corporations a 2-year notice to move their manufacturing to another country, because that is when imports from China can be blocked. How long would it take for the Chinese economy to tank if the USA stopped all imports from China? The Trump approach was just to slap a tariff on things, without giving companies a chance to relocate their manufacturing. Telling the Chinese, "you've done this crap too many times, and it's time for you to actually get punished for

      • by necro81 ( 917438 )

        How long would it take for the American economy to tank if the USA stopped all imports from China?

        Fixed that for you.

        It is, quite frankly, impossible to decouple the US economy from China on a foreseeable timescale, and vice-versa. Certainly not in the 2-year scale you suggest, nor on the 4-year timescale of an American president.

        Sure, you might be able to get some companies to move their manufacturing somewhere else. But even the truly motivated ones would find that difficult - creating a new man

        • by Targon ( 17348 )

          China already has many limitations on imports, not the useless tariffs, but hard limits, so, it's the sort of thing that should be at least moved towards with the crap the Chinese government keeps doing. I agree that it wouldn't be as simple as I suggested, but on the flip side, pushing companies to move their manufacturing out of China should be done.

  • Chinese hacker stereotype. I'm not Chinese and could be a hacker, too. I'm offended.

  • Alternate Reality? (Score:5, Informative)

    by bill_mcgonigle ( 4333 ) * on Thursday October 10, 2024 @08:01AM (#64853369) Homepage Journal

    What false reality is this where Apple didn't build a backdoor into their custom-silicon GPU?

    https://arstechnica.com/securi... [arstechnica.com]

    The whitepaper details step-by-step how the full access portal is activated and you can reproduce it on your own device if it hasn't been updated since they were caught.

    The perniciousness of this is the knock is far into 64-bit address space so an exhaustive search would take decades. Only reverse-engineering an active exploit can find the addresses (or reversing the silicon).

    We even know NSA deploys this against US-Citizen journalists who are at home.

    The kayfabe gaslighting on this meme is astronomical. Is pretending somehow easier to live with mentally?

    • by AmiMoJo ( 196126 ) on Thursday October 10, 2024 @09:23AM (#64853523) Homepage Journal

      I suspect most CPUs have some kind of backdoor, intentional or not. They need to be tested during the manufacturing process, which usually involves secret op-codes and interfaces that let someone with the right knowledge probe the chip's inner workings.

      There's also the risk that microcode signing keys are leaked. They are obviously high value targets and likely irrevocable.

    • There's no evidence it was a backdoor, which implies it was intentional. It was more likely an unintentional vulnerability, which has since been patched.
      • If it was unintentional, then Apple is exceedingly incompetent in their release process. Which is more likely?
  • Angels and Demons (Score:5, Interesting)

    by necro81 ( 917438 ) on Thursday October 10, 2024 @08:07AM (#64853383) Journal
    To quote CGP Grey [youtube.com]: "The nature of a keyhole is to be cracked, and the nature of the Internet is to bring demons to the door. No matter how much we might wish it, there is no way to build a digital lock that only angels can open and demons cannot. Anyone saying otherwise is either ignorant of the mathematics, or less of an angel than they appear."
  • by kvezach ( 1199717 ) on Thursday October 10, 2024 @08:18AM (#64853399)
    Right About Backdoors:

    “Either everyone gets to spy or nobody gets to spy,” he said. “And once you accept that, then you decide, do you want everybody or nobody?”
  • by e3m4n ( 947977 ) on Thursday October 10, 2024 @08:32AM (#64853423)

    Next thing you know your playing WOPR in a classic game of tic-tac-toe to save the world from annihilation.

  • Can we call a company like Apple "captain obvious"? They are supposed to be like people right?
  • I agree with the conclusion, but the argument is wrong. Remember what apple refused to do was create software that would allow it to workaround the limit on password guessing so the FBI could brute force the device password. The fact they refused implies that they *could* create that kind of software. Presumably, nation states like China could -- at least with access to the appropriate apple secret keys -- create the same kind of workaround. A system where apple used a secret key on an airgapped sealed cryptographic module to create per device law enforcement decryption keys would be no less secure.

    The real danger is the second you create that legal precedent apple isn't going to be able to pick and choose which law enforcement requests it complies with -- be it from some random judge who issues the order ex-parte (say for a device image taken without your knowledge) without you having the chance to contest it or a request from judges in China. The danger here is mostly legal not technical.

    Indeed, the greater hacking risk is probably someone hacking into a local police department and changing the account ID requested in a warrant and then getting access to your icloud backups that way than hacking a well-designed system that allowed apple to issue secondary per device decryption keys to law enforcement.

  • by FeelGood314 ( 2516288 ) on Thursday October 10, 2024 @09:19AM (#64853513)
    I did FIPS testing on RIM (BlackBerry) devices back in 2003/2004. One of the requirements to pass the tests was that the tester have an API to get the random number used in signature generation. RIM devices would never reveal this number because with it you could discover the secret private signing key. I message NIST, explain the security problem with having such an API and be assured that it was an accident, the test case could be skipped and that it would be removed from the requirements. And then 2 or 3 months later the testcase would appear again.

    I was naive back then. The shit really hit the fan though when I was doing the FIPS testing on the original open SSL. It passed all the test cases but the random number generator wasn't the algorithm the authors claimed it was...
  • by Tom ( 822 ) on Thursday October 10, 2024 @09:34AM (#64853547) Homepage Journal

    If I had a dollar for every time I got to say "told you so", I could... well, at least go on a pretty nice holiday.

    The problem isn't this. It's not that it happened or that it was clear it would. The real problem is that those responsible knew that and still went ahead. And that they'll do the same thing again next time.

    Because as much as the right currently rages on the left for being woke and facts being shoved aside for the benefit of feelings - the right has done the same thing with surveillance for decades. 90% of TSA has zero actual security effect and is purely there so people feel secure.

    It's a problem you get every time politicans get to make decisions.

  • How dare they tap our wiretaps?!!
  • Everyone didn't want backdoors, they were forced into them.

    This headline makes it seem like Apple was some sole bastion of privacy and security, solely fighting the government against backdoors. They weren't the only ones against backdoors.

  • Yeah, working on cell phone software I was shocked that "Lawful Intercept" was so out in the open. You location, your texts, I assume phone calls as well, all available and logged based on your IMEI that I'm sure they get from your cell phone company Same probably exists for your ISP, browsing history, browsing location, OS type, etc And iPhones "frequent locations" on maps is also pretty scary where they want to know where you work, live, and frequent
  • Why are we calling routers back doors? The devices installed are primarily routers and possibly a small analytic blade for raw traffic. But mostly their job is to forward a small subset of all traffic. What is crazy is that by compromising these routers, China knew exactly what our government was interested in monitoring.

Pohl's law: Nothing is so good that somebody, somewhere, will not hate it.

Working...