TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

FBI document shows what data can be obtained from encrypted messaging apps

185 点作者 oedmarap超过 3 年前

17 条评论

rnotaro超过 3 年前
Related thread about the same document from a month ago (November 30th) with 450+ comments : <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29396643" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29396643</a>
sandworm101超过 3 年前
This document is classified U&#x2F;&#x2F;FOUO (unclassified&#x2F;&#x2F;for official use only). The actual abilities of the FBI&#x2F;NSA and like agencies are surely classified to some higher level.
评论 #29715420 未加载
评论 #29717518 未加载
dathinab超过 3 年前
Messages are decrypted when you read them.<p>It&#x27;s reasonable to believe that at any point in time Root exploits exist for both iOS and Android.<p>It&#x27;s viable that the FBI or someone they cooperate with has such exploits from time to time (which doesn&#x27;t mean they are reliable, or cheap to use).<p>If you root-hack a phone you can easily get all messages the user sees after you hacked it.<p>Even without root hacking you might get some, in some circumstances.<p>EDIT: I should have read the article first, it&#x27;s more about what content they get <i>without</i> hacking.
评论 #29716245 未加载
评论 #29722179 未加载
yosito超过 3 年前
I&#x27;m skeptical of the accuracy of this document. Telegram is by default unencrypted and virtually public. Yet this document says the FBI can&#x27;t get any message content?
评论 #29714675 未加载
评论 #29715317 未加载
评论 #29715958 未加载
评论 #29715178 未加载
评论 #29714690 未加载
评论 #29714709 未加载
评论 #29714688 未加载
stunt超过 3 年前
I worked long enough in telecom industry to know that there is no way for regulators to leave major communication platforms without some sort of surveillance. They can&#x27;t sleep without it, and they don&#x27;t take &quot;Oh! sorry it&#x27;s encrypted&quot; as an answer.<p>I don&#x27;t buy this. Maybe it&#x27;s true about FBI, but other agencies have the keys for right or wrong reasons.
评论 #29718677 未加载
neom超过 3 年前
18 U.S. Code § 2703 - Required disclosure of customer communications or records - Contents of Wire or Electronic Communications in Electronic Storage.<p>&quot;can render 25 days of iMessage lookups and from a target number.&quot;<p>I thought iMessage was E2EE and with all the iJunk turned off this isn&#x27;t possible?
评论 #29720049 未加载
评论 #29715208 未加载
评论 #29716724 未加载
exabrial超过 3 年前
Since you do not [most likely] have root access to your phone, you cannot directly examine what Apple&#x2F;Google has installed on _your specific_ phone. Any of these applications could have its memory examined transparently if the operating system is evil.
评论 #29715912 未加载
评论 #29716565 未加载
fotta超过 3 年前
Previously discussed: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29396643" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29396643</a>
vincnetas超过 3 年前
What are the obstacles with current technology to use OTP encryption technology. As far as i know its unbreakable. Of course you are limited to people you know in person, but that should be not an issue for people for who private communication is of most importance.
评论 #29716428 未加载
评论 #29716429 未加载
iRobbery超过 3 年前
&quot;The service was acquired by video conferencing software maker Zoom in May 2020.&quot;<p>thats when i revoked all my keybase information.
Threeve303超过 3 年前
Imagine how much of a threat to the current security and encryption model it would be if a remote desktop server was running quietly in the secure enclave. You likely would never be able to know it is running. What good is end to end messaging if you can be watched using the app?
acosmism超过 3 年前
is facebook messenger omitted because they dont have access to it?
评论 #29714962 未加载
评论 #29715731 未加载
评论 #29715908 未加载
morpheuskafka超过 3 年前
I don&#x27;t think this document has anything contrary to existing knowledge, but it does emphasize another significant reason that WhatsApp is not a great choice for privacy despite the use of E2EE. They readily hand over substantially more metadata, and while this is less likely to be enough evidence to convict someone of anything it is more than enough to seriously compromise privacy.<p>&gt; <i>Search warrant: Provides address book contacts and WhatsApp users who have the target in their address book contacts.<p>&gt; </i>Pen register: Sent every 15 minutes, provides source and destination for each message.
tomasreimers超过 3 年前
From the top: &quot;FBIs ability to legally access...&quot;<p>Implying there are illegal ways to access?
评论 #29716707 未加载
giuliomagnifico超过 3 年前
This has been already posted at least five times
DeathMetal3000超过 3 年前
Signal FTW!
pangolinplayer超过 3 年前
reaaallyyy!?!?! its simple. assume no privacy. someone is always watching.