this post was submitted on 24 Apr 2026
592 points (97.9% liked)

Technology

84103 readers
3209 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

I can't. I just can't.

you are viewing a single comment's thread
view the rest of the comments
[–] XLE@piefed.social 75 points 23 hours ago (1 children)

"Local" surveillance happening on the same car computer that's attached to a SIM card.

Yeah seems safe

[–] FauxLiving@lemmy.world 43 points 22 hours ago (1 children)

It's local right until the law enforcement gets into Bluetooth range with the right encryption keys to download all of the data for the past year.

[–] plz1@lemmy.world 51 points 20 hours ago (1 children)

Bold of you to assume any of this will be encrypted.

[–] tal@lemmy.today 14 points 18 hours ago (1 children)

I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.

https://www.networkworld.com/article/769321/insurgents-intercept-video-feeds-from-u-s-drones-using-26-software-report-says.html

Militants in Iraq and Afghanistan have intercepted live video feeds from unmanned U.S. Predator drones using $26 off the shelf software made by a Russian company, says a report in the Wall Street Journal.

[–] elephantium@lemmy.world 5 points 16 hours ago

IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.

Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.