this post was submitted on 26 Jul 2024
182 points (99.5% liked)

Technology

59143 readers
2314 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Police could lawfully use bulk surveillance techniques to access messages from encrypted communications platforms such as WhatsApp and Signal, following a ruling by the UK’s Investigatory Powers Tribunal (IPT), a court has heard.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 111 points 3 months ago (12 children)

The headline is a little misleading. The actual ruling is that police can obtain warrants to install surveillance malware on phones when they have evidence the owner is using it to communicate about crimes.

[–] [email protected] 21 points 3 months ago (10 children)

Could malware be installed without access to the physical phone? How would this be achieved. Is it with a backdoor from the phone manufacturer or infected somehow from the sim card service provider.

[–] [email protected] 3 points 3 months ago

Well just recently researchers discovered a campaign installing backdoors on iPhones using a chain of several 0-day expoits or in this case using also 0-click exploits, where no interaction from a user is needed. However those attack chain are so advanced that practically normal law enforcement would never be able to do it. But theoretically yes some well equiped state actors are able to infect you without noticing. If you are really intrested to see how advanced these attack are search for "project triangulation" or watch the recording from last years chaos computer conference: https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=373

load more comments (9 replies)
load more comments (10 replies)