• @[email protected]
    link
    fedilink
    20
    edit-2
    21 hours ago

    Well, backdoor for “good actors” is always a backdoor for everyone

    Not like all the privacy groups were shouting that since ever…

    Edit: and how can this still be regarded as E2E, when it’s obviously not?

    “But end-to-end encryption over texts between Apple devices and Android devices, for instance, aren’t encrypted in the same way, meaning they were vulnerable to interception by Salt Typhoon, according to the Times.”

    What is it I don’t understand here?
    If it’s E2E, then nobody could intercept my messages in a meaningful way.
    How is this still possible, when messages went from iOS to Android - or the other way round?
    At least Signal still holds strong, disregarding the OS

    • @[email protected]
      link
      fedilink
      Deutsch
      921 hours ago

      I feel E2E has become a marketing term and companies don’t hold the promise e.g. “it’s E2E but one end is your device and the other end is my server”

      • @[email protected]
        link
        fedilink
        319 hours ago

        Well, that would be really shit and wrong marketing

        Hopefully you’re wrong and this doesn’t take hold :⁠-⁠\

    • @RaoulDook
      link
      English
      522 hours ago

      Sounds like normal SMS texting or unencrypted RCS messaging between iOS and Android phones rather than E2EE

      • @[email protected]
        link
        fedilink
        221 hours ago

        Thanks!

        Never had a RCS conversation and didn’t really look into it.
        Do you’re probably right, that it’s about that.

  • @Grimy
    link
    19
    edit-2
    23 hours ago

    Get out China, those are our backdoors.

    • Ephera
      link
      fedilink
      English
      520 hours ago

      Yeah, before reading the article, I wanted to leave a snarky comment, whether it’s really a worse hack than the NSA, but it turns out, it might be the same hack after all.

  • @[email protected]
    link
    fedilink
    520 hours ago

    Summary generated by Copilot, for everyone as lazy as me:

    China-linked hackers, known as Salt Typhoon, infiltrated U.S. telecommunications infrastructure, exploiting systems used for wiretapping Americans in criminal cases. This breach, described as the worst telecom hack in U.S. history, allowed hackers to listen to phone calls and read text messages. The networks remain compromised, and drastic measures are needed to secure them. The hack targeted fewer than 150 people, mostly in Washington DC, but the actual number of affected individuals could be much higher. Encrypted communications via apps like Signal and iMessage were likely protected.