Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BO
Posts
0
Comments
366
Joined
2 yr. ago

  • Thanks for posting this; I'd been seeing a lot of people talking about how China was using backdoors that the FBI wanted and used, but hadn't seen anything definitive about US use of those vulnerabilities.

    Also this is another reminder for me that I'm glad to be able to vote for Wyden.

  • Signal, Whatsapp, etc are great, as long as I don't have access to your phone and password, right? Likewise, what if your phone's operating system has a critical vulnerability that the OS makers don't know about (AKA a zero day) that can allow a complete remote takeover of your device after a single click on a text message? It didn't end well for Jamal Kashoggi: https://www.cnn.com/2019/01/12/middleeast/khashoggi-phone-malware-intl/index.html

    E2EE is great for data in transit, and full disk encryption is great for if someone steals your locked device. Neither will help if you have compromised code running on your machine, though.

  • My understanding is that intention is not uncommonly litigated; I believe the question of "intent to deceive" is central to trademark law, for example. That's also what the the "degrees" of murder etc are about.

    Disclaimer: I'm not a lawyer. I do read an awful lot of contacts and talk to lawyers.