Edit: Changed “the government” to “governments”

I mean, people say use end to end encryption, VPN, Tor, Open Source Operating System, but I think one thing missed is the hardware is not really open source, and theres no practical open source alternative for hardware. There’s Intel ME, AMD PSP, so there’s probably one in phones. How can people be so confident these encryption is gonna stop intelligence agencies?

  • Swordgeek@lemmy.ca
    link
    fedilink
    arrow-up
    17
    ·
    19 hours ago

    We don’t.

    We really really don’t.

    Consider the attack that Israel carried out this fall by detonating walkie-talkies and pagers. This wasn’t just some illicit code in the firmware or hardware, they managed to hijack the supply chain and hide literal bombs in commercially-produced handheld devices!

    Bottom line: If you do not directly control the production chain from chip design and fab to end-user software, you can never be sure.

    40 years ago, the legendary Ken Thompsonand Dennis Ritchie accepted the Turing Award for creating Unix. Thompson’s acceptance speech Reflections on Trusting Trust pointed out this same fundamental security flaw.

    I encourage everyone to read the article, and spread it as widely as possible. It is terrifying and accurate, nearly half a century later.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    22 hours ago

    It’s not just back doors. All governments will have a group of people who’s job is to find security vulnerabilities in OS and use them to attack other nations.

    If Wanacry rings a bell the you might be aware that the Eternal Blue exploit was the infection vector which was originally designed by the NSA and leaked by a hacking group. Only after the leak did the NSA tell Microsoft how it worked and it was patched.

  • Sylvartas@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 day ago

    https://en.wikipedia.org/wiki/Intel_Management_Engine

    https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor

    If I was a government intelligence agency I’d probably sell my soul to get access to these…

    I get that they have legitimate use cases for corporations, but why are there virtually no consumer grade CPUs without that stuff ? Surely they would be less expensive and no one would miss the features on their home computers.

  • Boot@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    19 hours ago

    ‘They’ (I.e. government agencies/PPP) actively exploit weaknesses or institutionally create them. Personal favorite is the backdoors built into TETRA, which is used for mainly government purposes (law enforcement, emergency services). ETSI acts as a strawman for government interest and serves no cause other than that of its masters. That bugs me to no end because this does not serve any purpose.

    https://www.zetter-zeroday.com/interview-with-the-etsi-standards/

    • ERROR: Earth.exe has crashed@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      1 day ago

      AFAIK, his leaks showed that corporations are collaborating, and software could have backdoors. I don’t think they ever showed docs that reveal non-targeted hardware based surveillance. The common understanding post-snowden was, use Open Source OS and use Encryption and you’re safe, unless you are specifically targeted.

      My question is asking about hardware-based mass surveillance.

  • nothacking@discuss.tchncs.de
    link
    fedilink
    arrow-up
    15
    ·
    1 day ago

    There’s no way to check the whole thing, but you can totally pick a component and reverse engineer it, which is something people do quite a bit. When spying is found, it’s usually a private company doing it.

    The NSA doesn’t care about your search history, but advertisers do. (and the government ever did, they’ll just call up google)

  • LordCrom@lemmy.world
    link
    fedilink
    arrow-up
    16
    ·
    1 day ago

    I’ve worked for the government. They had me managing 78 full AWS accounts for various departments. Me, 1 guy. And I had to explain basics of tech to everybody in charge of the cloud accounts.

    Our gov can barely manage itself, let alone some next level tech on millions of devices and keep track of it all. They couldn’t even get me a new mouse without 2 forms, 1 online ticket, and 2 levels of approvals.

  • kadup@lemmy.world
    link
    fedilink
    arrow-up
    44
    ·
    2 days ago

    We know they do, actually.

    All US companies provide the NSA with backdoors. All modern AMD and Intel CPUs have the ability to run remote code signed by their manufacturer and snoop into memory.

    Put the two things together and now you know.

    • Ephera@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      1 day ago

      I’m not aware of us knowing that they provide backdoors vulnerabilities to the NSA. If US companies have data, then they’re legally obliged to make it available to the NSA (PATRIOT and CLOUD Act). The NSA may also separately develop backdoors (e.g. EternalBlue). But that the NSA coerces US companies to actively attack their customers, is news to me.

      • Venator@lemmy.nz
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        20 hours ago

        modern AMD and Intel CPUs have the ability to run remote code signed by their manufacturer and snoop into memory.

        If US companies have data, then they’re legally obliged to make it available to the NSA (PATRIOT and CLOUD Act).

        The key used to sign the remote code could be considered data that they’re legally obliged to make available to the NSA? 🤷😅

        That said, the lengths they had to go to for stuxnet kinda implies it’s still not super easy to do, but I guess maybe they were using older cpus that don’t have the signed code vulnerability? 🤷

        • Ephera@lemmy.ml
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          1 day ago

          Hmm, I just realized that “backdoors” in my previous comment had somewhat of a double-meaning. They do provide the NSA access to data that they have on their servers. In that sense, a backdoor exists, which is also what this PRISM article confirms.

          But knowingly integrating vulnerabilities and making these available to the NSA for attacking customer devices, that is another shtick entirely. And I’m not finding anything in that article that says so (although I only read the parts that seemed relevant).

          • underwire212@lemm.ee
            link
            fedilink
            arrow-up
            3
            ·
            1 day ago

            Yes this is something I’m more interested in learning as well. Data access to servers by adversaries can be largely mitigated with E2E encryption and VPN use so that even if, for example, the NSA wanted data on certain servers, unless they had an encryption key, would be largely meaningless (unless metadata wasn’t encrypted). We largely know that if LE wants data, they can get a court order to hand it over.

            What I’d like to know is if there has been any evidence of “hardware” backdoors like what you now describe. I haven’t been able to find evidence of any successful attempts by major agencies/corporations, but I guess part of a successful attempt involves the public not knowing that it exists.

            My threat model has me using an iPhone with Lockdown Mode & Advanced Data Protection enabled. I am wondering if I need to reassess my model to potentially go for the Pixel with GrapheneOS.

            According to my research, the iPhone with these specific settings for reducing attack surface and encrypting everything that gets put onto servers is more than enough for myself (admittedly a pretty stringent threat model). But would also like to hear what others think.

  • hendrik@palaver.p3x.de
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 day ago

    Yeah, we don’t. It’s generally hard/impossible to prove the nonexistence of something. Similar as with God. It’s unlikely, but we can’t prove he doesn’t exist with certainty. These proofs only work for very simple and contained systems.

  • Strayce@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    35
    ·
    edit-2
    2 days ago

    We don’t. The point is to reduce attack surface relative to target value. People use a VPN for piracy, for example, not because it’s totally secure, but because rights holders generally aren’t going to bother going after a single person when they’d have to go thru a VPN provider as well. OTOH someone doing it on clearnet is being logged by their ISP and the data is right there. OTOOH, the three letter agencies are absolutely going to bother if they have a tip that you’re doing something really dangerous to the status quo.

    TL;DR: It’s like IRL security. If somebody really wants your shit, they’ll find a way to get it. The point is to make it generally not worth it.

  • bizarroland@fedia.io
    link
    fedilink
    arrow-up
    21
    ·
    2 days ago

    Okay so here’s my take on it not that anybody asked.

    There are likely back doors in all computerized Networked devices.

    There is likely some identifying information being sent back to random servers from a myriad of places.

    That being said, you are not worth the time to directly observe.

    Most likely, all of this data goes into a large database where they analyze trends and look for people that are outside of various tolerance zones.

    Other than that, all of your data is just noise, grist for the grist Mill.

    It is only when you become a person of interest who is worth devoting the time to directly analyze that these risks escalate to the point where you should have concern about it.

    99.9999% of us are just not important enough to pay attention to.

    • Venator@lemmy.nz
      link
      fedilink
      arrow-up
      2
      ·
      20 hours ago

      That being said, you are not worth the time to directly observe.

      At the moment; it’s important to remember facist governments can end up doing things that make no logical sense for idealogical reasons, so the best protection is to try to avoid ending up with a fascist government.

    • jrs100000@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      2 days ago

      Also the government is not all one monolithic entity. Just because the NSA has a backdoor doesnt mean theyll hand that information out to anyone who asks. Maybe if the CIA fills out a ton of paperwork, but if its the FBI theyll laugh in their faces and tell them the data doesnt exist.

      • BearOfaTime@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        1 day ago

        The Jersey drone story is a great example.

        The FAA posted a a security update for the Picatinny area a few weeks ago. Now where did that come from? Some governmental org that wanted to do testing.

        But the rest of government was unaware, so could honestly say they didn’t know anything about the drone activity.

        • jrs100000@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          Cause the FBI are the keystone cops of the intelligence world. Theres a reason they spun off a whole new agency rather than just give the FBI unlimited resources for the war on terror.

  • lurch (he/him)@sh.itjust.works
    link
    fedilink
    arrow-up
    16
    ·
    2 days ago

    If the government wants to snoop, they can just get a Certificate Authority in the boat and MITM whoever they want.

    In my region there are laws that telecoms have to provide a way to let the government snoop, but the government doesn’t use it without probable cause.

    Some people think a VPN will protect them, because the provider doesn’t log, but all the government needs is the VPN keys and they can intercept all traffic between the VPN and the user and log it themselves.

    • abbadon420@lemm.ee
      link
      fedilink
      arrow-up
      10
      ·
      2 days ago

      …the g9verenment doesn’t use it without probably cause YET.

      The way politics are going lately, that might all change in an instant. Not that there’s anything you or I can do about it. I’m not trying to fearmonger here, just that you shouldn’t be putting any Qurans or Communist manifestos on your Onedrive account, that’s all. Be mindful.