/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Experts have long warned “secure backdoor” systems are impossible; Salt Typhoon's reported hack of US ISPs' wiretap systems exemplifies the risks of backdoors

Security professionals and technologists have for years been sounding the alarm about the security risks of backdoors … Riana / @riana@mastodon.lawprofs.org : “Blaze told TechCrunch that the Chinese intrusions into U.S. wiretap systems are the latest example of malicious abuse of a backdoor ostensibly meant for lawful and legal purposes.  The security community has long advocated against backdoors, arguing that it is both technologically impossible to have a “secure backdoor” that cannot also be exploited or abused by malicious actors.” … Zack Whittaker / @zackwhittaker@mastodon.social : There 👏 is 👏 no 👏 such 👏 thing 👏 as 👏 a 👏 secure 👏 backdoor.  —  https://techcrunch.com/... Bluesky: Scary Mary Branscombe / @marypcbuk.bsky.social : secure systems with a backdoor are like the rhythm method of contraception - much more about luck than judgement [embedded post] @riana.bsky.social : Beyond its “told you so” relevance to the crypto wars, one point this story makes is that when your phone service provider gets pwned, normally they have to disclose that promptly, but the USG can suppress the disclosure if there's a natsec angle.  Consumer (and shareholder) protection loses out. …

TechCrunch