TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

FBI tells telecom firms to boost security following Chinese hacking campaign

17 点作者 voisin5 个月前

4 条评论

omgCPhuture5 个月前
&quot;Encrypted&quot;. Emphasis on *transport cryptography! Signal etc mesages can be found in phone memory even after reboot. Someone should really hold a crash course on how to crypto on your devices from FS to messdate data over IP works: *It&#x27;s not your crypto, but a bunch of others, (strangers, dangers) people&#x27;s crypto who&#x27;s __word__ you accept for Gospel (trust us, we know best!:) Not to mention if your packets have reached correct end point and not one the CA just says it the expected one__!*<p>* You blindly trust a daisy chain of stranger&#x27;s word that their code and their CA and they themselves are uncrackable &amp; secure. Would you trust strangers insisting on being all in your secure bits?<p>* Most industry CA based. hardware does not disclose vulnerablities or noice that patches are incoming t the end user, they secretley fix after their lients, your servivce provder typically, has beengiven advisories. Those rarely are givenn to the en dus,t he customer, because of NDA or even lazyness, security by obscurity incomeptence etc.<p>Smart device encryption is an illusion where your trust strangers with legal&#x2F;financial or Intel motives to betray it, but call strangers fancy names like CA, ROot of Trust, etc.<p>The entire ecosystem of trust based device security crypto is to ensure their access to your daa, securely. Not to secure your data from them or the OEM, and TLS padlocks simply means the CA told your app whtever certificate pres4ented is the right one, green lighting you and that endpoint to negotiatie encryption, so for all you know you aor your app could be negotating encryption with the US FBI or $APT.<p>* CAs do get compromised by attacker, nation states &amp; researchers,, encryption standards do get backdoored, with weak implementations or even kleptographic ones.<p>q: Why is the US FBI causing panic about suppposed chinese hacking isntead of contacting us service provides who can enable 4g &#x2F; LTE IPSEC transport, supported by all certified handsets and USIM, yiuelding telecom network infratrcture acccess a moot point since ipsec tunnel is from you to your service provider and their end point.<p>A: You are victims of on-going psyop conditioninig you to trust blindly!<p>Do not fall for the temptation: Every part of the daisy chain of trust providers have insentives to screw you over at their whim...and then there is all the code they + you rely on to bootstrap that daisy chain of naive trust..
ozgrakkurt5 个月前
It is funny how they hate encryption because they want to spy on people and try to justify it by saying people share child porn and terrorists use it etc. But they start recommending it when it conflicts with their interests. Or it is not funny and it is just the way governments and companies work
webninja5 个月前
Respond to my comment with your recommendation(s) for apps that allow or assist you in contacting others with encryption strong enough to keep out state-level attackers.
hunglee25 个月前
it was FBI insistence of backdoors on telecomms infrastructure - in order to spy to US citizens - which created the vulnerability in the first place.
评论 #42322129 未加载
评论 #42321751 未加载
评论 #42322649 未加载