6 Matching Annotations
  1. Nov 2020
    1. If the EU is set to mandate encryption backdoors to enable law enforcement to pursue bad actors on social media, and at the same time intends to continue to pursue the platforms for alleged bad practices, then entrusting their diplomatic comms to those platforms, while forcing them to have the tools in place to break encryption as needed would seem a bad idea.

      One explanation for the shift away from Whatsapp (based off the Signal protocol) is that the EU themselves are seeking legislation to force a backdoor into consumer tech.

  2. Oct 2020
    1. In at least one instance, a foreign adversary was able to take advantage of a back door invented by U.S. intelligence, according to Juniper Networks Inc, which said in 2015 its equipment had been compromised. In a previously unreported statement to members of Congress in July seen by Reuters, Juniper said an unnamed national government had converted the mechanism first created by the NSA.

      NSA gets Juniper to put a backdoor in one of their products. The product gets compromised by a foreign government in 2015.

  3. Jun 2020
  4. Feb 2016
    1. However, like for any other management interface, good security practices dictate the placement of the IPMI management port on a dedicated management LAN or VLAN.

      OK this is the standard way to mitigate possible attacks from the pubblic Internet: but what about possible backdoors in IPMI software?