this post was submitted on 09 Jul 2024
431 points (98.9% liked)
Technology
59217 readers
2528 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Even if law enforcement can get a warrant, unless there's a backdoor in the encryption then the data stays private. That's the whole point of encryption.
The fundamental problem is law enforcement feeling entitled to snoop on private communications with a warrant vs the inherent security flaw with making a backdoor in encrypted communications. The backdoor will eventually get exploited, either by reverse engineering/tinkering or someone leaking keys, and then encryption becomes useless. The only way encryption works is if the data can only be decrypted by one key.
Anyone else remember when TSA published a picture of the master key set for TSA approved luggage locks and people had modeled and printed replicas within hours?
That's also true. Wiretapping internet communications was more valuable pre-2010s when things weren't encrypted. It is good that things are encrypted now. There's still some metadata that can be pulled now from ISPs, such as IP addresses, SNI, and unencrypted DNS, but cops are better off subpoenaing Facebook and Google than trying to wiretap.