this post was submitted on 23 Jan 2025
301 points (100.0% liked)

Technology

70048 readers
3751 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

The push comes as India seeks greater regulatory control over global tech companies. The initiative would require manufacturers to include the government's GOV.in app store and related apps like BHIM, DigiLocker, VoterID on smartphones sold from India.

Beyond pre-installation, they also requested that their apps be available for download outside the company's app stores from third-party sources without triggering "untrusted source" warnings.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 3 months ago (1 children)
[–] [email protected] 30 points 3 months ago (1 children)

These are neither confirmed, nor have ever been proven, and don't deal with phones.

The first link is about networking hardware, which has already been found by security researchers long ago.

The second is about an attempt at doing something like a backdoor that never came to fruition.

The last link has never been observed or proven, and how it would work is impossible to know. Having a "backdoor" on a CPU is meaningless without the other attached hardware to work with. Some would say impossible, and made up.

[–] [email protected] 5 points 3 months ago (2 children)

So you don’t believe anything that’s been leaked by whistleblowers? You think the Snowden stuff is all fake?

[–] [email protected] 18 points 3 months ago (2 children)

Depending a lie with whataboutism is a bad look.

Why not just admit you don't know, but enjoy being paranoid and conspiratorial in this space?

[–] [email protected] 3 points 3 months ago

What lie? What “whataboutism”? The person tried to deny there’s any surveillance built into western technologies, and I gave a prominent example to prove them wrong. That’s not what “whataboutism” means.

Weird move for y’all to burn your astroturf accounts gaslighting people about what we’ve all personally witnessed from whistleblowers. You really expect that to work?

[–] [email protected] 3 points 3 months ago

Once: apparently the number of times someone has said “I enjoy being paranoid“

[–] [email protected] 12 points 3 months ago (1 children)

The NSA activities Snowden leaked were specifically happening in data and telecom centers to snoop traffic in transit. He make known some secret programs about exploiting and compromising devices, but of that's already known as a possibility. He never detailed anything about backdoors on phones from manufacturers as you've suggested.

[–] [email protected] 3 points 3 months ago (1 children)

Right, the Snowden leaks did not include phone backdoors. Just everything else you denied.

[–] [email protected] 8 points 3 months ago (1 children)

Lol I'm not denying anything but your misguided comment. It's not accurate.

[–] [email protected] 1 points 3 months ago (1 children)
[–] [email protected] 7 points 3 months ago (1 children)
[–] [email protected] 1 points 3 months ago (2 children)
[–] [email protected] 9 points 3 months ago* (last edited 3 months ago) (1 children)

Again-and maybe you don't know what a backdoor is exactly-this is not from the manufacturer as you've claimed. This is Dropoutjeep, a long-patched vulnerability that was exploited to install a backdoor.

Your original comment is about manufacturers installing backdoors, and this is not that. This is also decade old news.

No goalpost has been been moved here, you haven't even left the endzone yet with your claims.

Direct quote from you: "as if there aren’t western backdoors built into all of these."

And again, to date, this has not been the case. No manufacturer has been building backdoors into devices. Other hackers finding exploits and continuing to exploit them on behalf of governments is not the same thing. It's detectable, it's measurable, and it only works on small groups of devices, not an entire population.

[–] [email protected] 1 points 3 months ago (1 children)
[–] [email protected] 9 points 3 months ago (1 children)

You keep sending these, and they have nothing to do with what you're claiming at all. Just stop lol

[–] [email protected] 1 points 3 months ago (1 children)

Way to out your astroturf account. Anyone reading this far is going to click at least one of those links, so I’m not really sure how effective you think denial is going to be.

[–] [email protected] 6 points 3 months ago (1 children)

Lol what are you even talking about? No edits have been to any of my comments. You're just insane, friend.

[–] [email protected] 1 points 3 months ago

Who said anything about edits? Bot’s broke.

[–] [email protected] 2 points 3 months ago

This is accomplished by installing spyware directly onto the device, part of a program called DROPOUTJEEP.

So, not a backdoor?