106
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 04 Feb 2026
106 points (99.1% liked)
Technology
81207 readers
1074 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
Is this an advertisement? Sure, yes. The government can get into any phone? No.
Any iPhone? Almost certainly.
Virtually any phone I would say, yeah. Either by rubberhose cryptanalysis or by sheer time, money, and tools, they most likely can.
So "any phone" turned into "virtually any phone", and the owner needs to be alive and apprehended, and then they "most likely" can, maybe.
See, I mostly agree with what you said. But you can see how we have moved the goalpost away from "there is no phone the government cannot get into", to "the government can get into most phones", which is quite a different statement.
I am not moving goalposts or making different statements, I'm not the user you were replying to.
I also mostly agree with you, but my angle is that the difference between "the government can get into virtually any phone" and "the government can get into most phones" is that the latter makes it seem like you can be "smart/knowledgeable enough" to avoid that, and that's untrue. You should assume everything you keep on your phone can be extracted because of the nature of smartphone manufacturers, the supply chain etc, but I do not believe no phone can't be broken into like OP was saying, thus "virtually any phone" seems fitting.