/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Experts have long warned “secure backdoor” systems are impossible; Salt Typhoon's reported hack of US ISPs' wiretap systems exemplifies the risks of backdoors

Security professionals and technologists have for years been sounding the alarm about the security risks of backdoors … Riana / @riana@mastodon.lawprofs.org : “Blaze told TechCrunch that the Chinese intrusions into U.S. wiretap systems are the latest example of malicious abuse of a backdoor ostensibly meant for lawful and legal purposes.  The security community has long advocated against backdoors, arguing that it is both technologically impossible to have a “secure backdoor” that cannot also be exploited or abused by malicious actors.” … Zack Whittaker / @zackwhittaker@mastodon.social : There 👏 is 👏 no 👏 such 👏 thing 👏 as 👏 a 👏 secure 👏 backdoor.  —  https://techcrunch.com/... Bluesky: Scary Mary Branscombe / @marypcbuk.bsky.social : secure systems with a backdoor are like the rhythm method of contraception - much more about luck than judgement [embedded post] @riana.bsky.social : Beyond its “told you so” relevance to the crypto wars, one point this story makes is that when your phone service provider gets pwned, normally they have to disclose that promptly, but the USG can suppress the disclosure if there's a natsec angle.  Consumer (and shareholder) protection loses out. …

TechCrunch