nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,9 Tsd.
aktive Profile

#backdoors

5 Beiträge4 Beteiligte0 Beiträge heute
Antwortete im Thread

@JessTheUnstill @Pibble Yes and no.

The sheer ability and willingness of Apple to do this makes them inherently untrustworty.

#iOS is not like @GrapheneOS where you have means to audit it's integrity on the fly built-in.

Our latest Cyber & Cognitive Conflict Compass (4C) is out: Austria busts Russian #disinfo, Serbia hit with #Pegasus spyware, Lazarus fakes job offers, FamousSparrow sharpens malware, UK rolls out #AI facial recognition and the German coalition talks discuss encryption #backdoors and expansive surveillance. #Cyber never sleeps.

internationalcybersecurity.sub

Cyber & Cognitive Conflict Compass (4C) · Disinformation, Data Breaches, and Digital DystopiasVon International Cybersecurity

"We don’t know what pressure the Trump administration is using to make intelligence services fall into line, but it isn’t crazy to worry that the NSA might again start monitoring domestic communications.

Because of the Signal chat leak, it’s less likely that they’ll use vulnerabilities in Signal to do that. Equally, bad actors such as drug cartels may also feel safer using Signal. Their security against the US government lies in the fact that the US government shares their vulnerabilities. No one wants their secrets exposed.

I have long advocated for a "defense dominant" cybersecurity strategy. As long as smartphones are in the pocket of every government official, police officer, judge, CEO, and nuclear power plant operator—and now that they are being used for what the White House now calls calls "sensitive," if not outright classified conversations among cabinet members—we need them to be as secure as possible. And that means no government-mandated backdoors.

We may find out more about how officials—including the vice president of the United States—came to be using Signal on what seem to be consumer-grade smartphones, in a apparent breach of the laws on government records. It’s unlikely that they really thought through the consequences of their actions.

Nonetheless, those consequences are real. Other governments, possibly including US allies, will now have much more incentive to break Signal’s security than they did in the past, and more incentive to hack US government smartphones than they did before March 24.

For just the same reason, the US government has urgent incentives to protect them."

schneier.com/blog/archives/202

Schneier on Security · The Signal Chat Leak and the NSA - Schneier on SecurityUS National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities. "I didn’t see this loser in the group," Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. "Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out." Waltz’s implication that Goldberg may have hacked his way in was followed by a ...
#USA#CyberSecurity#Signal

Are Encryption Backdoors Putting Your Organization at Risk?

In this clip, @sherridavidoff and @MDurrin explain why encryption backdoors are a nightmare for organizations, creating security gaps that cybercriminals can exploit.
Watch this full episode of Cyberside Chats to hear Sherri and Matt break down Apple’s battle against the UK’s demands for backdoor access, the worldwide backlash, and what it all means for cybersecurity professionals.

We'll cover:
▪ Why backdoors are a double-edged sword for security
▪ Historical backdoor failures that left organizations exposed
▪ Pro tips to strengthen your security posture against evolving encryption policies

🎥 Watch the full video: youtu.be/5HhNKMIJkCQ
🎧 Listen to the podcast: chatcyberside.com/e/the-encryp

01net
Les députés ferment la porte aux écoutes de WhatsApp, Telegram et Signal par les forces de l’ordre
l’Assemblée nationale a voté contre le texte qui voulait imposer des portes dérobées aux messageries chiffrées – une mesure controversée qui mettrait à mal la confidentialité de nos conversations
mcinformactions.net/les-depute
#cybersurveillance #piratages #backdoors #chiffrement #AssembleeNationale

"The fundamental issue is simple: encryption is mathematics and mathematics doesn’t discriminate between a government investigator and a criminal hacker — a back door is a back door and if it’s there, anyone can enter.

There’s also a contradiction at play. If politicians dream of making the UK a technology hub they should not be working to undermine the foundations of cyber security, on which a workable tech industry relies.

The government should withdraw its misguided mandate. Instead of surreptitiously cutting the brake cables on the technological car, it should be working to strengthen security and privacy of the technology that forms the nervous system of our world. Business leaders must also take a role, making it clear that these dangerous moves are unacceptable, and pushing the companies they license technology from to deploy encryption, and other protections, without which their interests and those of their customers will be vulnerable.

We have ceded so many of the core operations of our lives and institutions to tech, we must recognise that strong encryption isn’t the enemy of security — it is security. The argument that weakening encryption will make any of us safer is as wrong as it is dangerous."

ft.com/content/a934150f-e0f5-4

Financial Times · The war on encryption is dangerousVon Meredith Whittaker
Antwortete im Thread

@t3sserakt @taschenorakel @ottenser @eliyahhavemann

Da man sich gegen einen Anruf von einer unbekannte Nummer (beim ersten Mal) nicht wehren kann, kann also quasi jeder davon betroffen sein.

Drei Messenger aus den USA, von 3 verschiedenen Herstellern und mit 3 mal der gleichen "Lücke" - da kann man auch schon locker von einem System sprechen.

Klar, diese "Lücke" ist mittlerweile überall behoben, aber wer weiß schon was die USA heute für #Backdoors eingebaut hat!