I think that is a fair summation of my position; one is at scale and largely impossible to defend against (legaly compelling) especially on a global scale and the other is natural law and impossible to prevent.
-
-
In this scenario there is a increased risk of being caught vs a built in backdoor; it also requires being to compel not only signing but construction of the hacked binary which atleast in the US has been determined to be illegal. Beyond that it doesn’t scale to needed volumes.
-
A similar attack worked when the feds used it for hushmail, no? Not sure I agree it's illegal, because it's really happened in the past.
- 5 more replies
New conversation -
-
-
This is basically what FBI tried to force Apple to do.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Do you even need exploits if you can just decrypt a sysadmin's login session for your target (on the wire) or put your backdoor on their device at a border stop?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
This Tweet is unavailable.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.