this post was submitted on 26 Mar 2025
545 points (100.0% liked)

Technology

68187 readers
4008 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

One of the most basic tenets of cybersecurity is that you must “consider your threat model” when trying to keep your data and your communications safe, and then take appropriate steps to protect yourself.

This means you need to consider who you are, what you are talking about, and who may want to know that information (potential adversaries) for any given account, conversation, etc. The precautions you want to take to protect yourself if you are a random person messaging your partner about what you want to eat for dinner may be different than those you’d want to take, if, hypothetically, you are the Secretary of Defense of the United States or a National Security Advisor talking to top administration officials about your plans for bombing an apartment building in Yemen.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 20 points 1 week ago* (last edited 1 week ago) (3 children)

Government secure phones are special hardware made by the NSA. They are nothing like civilian phones. Obama got the NSA to lock down his Blackberry but I doubt that is doable with today's mainstream smartphones.

https://en.m.wikipedia.org/wiki/STU-III

[–] [email protected] 2 points 6 days ago (1 children)

The last stu-3 stopped working in 2009.

[–] [email protected] 3 points 6 days ago

Yes they have different stuff now, but same idea.

[–] [email protected] 5 points 1 week ago

I actually wouldn't be shocked if it was possible with modern smartphones. A significant amount of money is available to be made from federal security work, and meeting the NSA criteria has benefits that extend to companies that work in the federal security space as well.

[–] [email protected] 2 points 1 week ago

As long as you can flash them, everything's possible.

In that spirit: Fuck Apple to hell.