TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

9 pointsby psibiover 11 years ago

2 comments

bostikover 11 years ago
Let&#x27;s see if I understood this correctly. Building snooping capabilities into networking gear is so inherently insecure that it would be better to just allow wiretapping to happen by exploiting known vulnerabilities?<p>The law of unintended consequences will cause that to backfire in spectacular way. In order for LEOs to maintain their wiretap capabilities, they would very likely start to issue gag orders on vendors and to prevent them from fixing some of their more &quot;valuable&quot; vulnerabilities. Hell, why not flat out require certain classes of bugs to be present at all times?<p>In effect, there would be no practical difference between a built-in backdoor and a critical security bug.
Nemantover 11 years ago
Is the speaker going to practically show how to snoop the network&#x2F;phone calls? From the description I&#x27;m imagining a very vague talk :&#x2F;