235
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 08 May 2024
235 points (80.4% liked)
Privacy
32130 readers
1064 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
You don't need a backdoor in signal to bypass its encryption.
All you need is to exploit the phone and wait for them to open or use signal.
If you think your phone is safe from the NSA or similar services, I got some bad news for you.
I'm 100% secure, I have Nord VPN
This comment sponsored by NordVPN
I forgot to post an affiliate link and explain how routing all your internet traffic though one company equals security
You mean my ISP which is known to monitor, censor, keep logs, and sell my info or Mullvad who hasn't been caught doing that yet?
Physical access is root access. But just because you can't make something NSA-proof dosen't mean you can't make it bloody difficult to break into.
There's been enough zero day remote exploits that there's bound to be more.
Pretty sure there's more than 1 about receiving an SMS and the payload rooting the phone and you not even knowing it happened. At least 1 but I think 2 or more.
Something about a malicious image also rooting a phone.
It goes on and on and phones don't always get security updates.
You can do your best, but then longer you use a given phone the higher the risk. That's why people switch out phones frequently when doing shady or important shit
That works for every IM.
It'd almost like... phones aren't secure.
Nothing is against the attack described TBF.
Say, if I run only OpenBSD, carefully selecting non-base applications, with tightened setup and so on, the baddies may just come when I'm not at home and flash a trojan into my laptop's UEFI.
Well, it's easier with phones because these likely already have plenty of backdoors to do this remotely, available only for nation-states.
I'm starting to like the taste of this "conspiracy theorist" thing.