this post was submitted on 16 Dec 2024
62 points (88.8% liked)

Technology

61227 readers
4315 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] boatswain@infosec.pub 16 points 1 month ago (1 children)

Signal, Whatsapp, etc are great, as long as I don't have access to your phone and password, right? Likewise, what if your phone's operating system has a critical vulnerability that the OS makers don't know about (AKA a zero day) that can allow a complete remote takeover of your device after a single click on a text message? It didn't end well for Jamal Kashoggi: https://www.cnn.com/2019/01/12/middleeast/khashoggi-phone-malware-intl/index.html

E2EE is great for data in transit, and full disk encryption is great for if someone steals your locked device. Neither will help if you have compromised code running on your machine, though.

[–] Turret3857@infosec.pub 6 points 1 month ago (1 children)

I see, that makes sense. I feel like I should have been able to figure that out but my puzzle solving skills aren't the best lol

[–] boatswain@infosec.pub 5 points 1 month ago

There are a lot of parts to the puzzle! It's easy to miss some.