All "back doors" are eventually found and exploited. The only solution is to not have them.
Archive: https://archive.today/FDhh0
From the post:
>At EFF we’ve long noted that you cannot build a backdoor that only lets in good guys and not bad guys. Over the weekend, we saw another example of this: The Wall Street Journal reported on a major breach of U.S. telecom systems attributed to a sophisticated Chinese-government backed hacking group dubbed Salt Typhoon.
All "back doors" are eventually found and exploited. The only solution is to not have them.
Archive: https://archive.today/FDhh0
From the post:
>>At EFF we’ve long noted that you cannot build a backdoor that only lets in good guys and not bad guys. Over the weekend, we saw another example of this: The Wall Street Journal reported on a major breach of U.S. telecom systems attributed to a sophisticated Chinese-government backed hacking group dubbed Salt Typhoon.
Login or register