You hit the nail on the head when you say its Laziness!. I wish they would stop using "children" as an excuse. If that was true then they would ban fire-works, sugar, calories, sweets, fast-food, fizzy drinks, physical contact sport, social media, over violent cartoons and movies, etc etc etc. Great upload 👍
I'm not aware of a public list of models (or if isolated to business vs consumer) w/may or may not carry capability. I would assume nearly all ISP hardware at some point. Never hurts to control your own secondary router. There is an interest in expanding capability / collection points - some reports suggest interest in certain of foreign dest etc. But what I can say is 2 companies known: cisco, juniper (doesn't mean all models have intercept vulnerable hardware, but worth assuming - since this is a security risk). You can search google to find publicly accessible documentation on the protocols for their hardware intercept portals if interested. Maybe look up arris for fun (hardware used by one of largest isp). ;)
For example, in Korea, users of bittorrent were "hacked" / attacked / compromised by their own ISP, simply for being torrent users, even though many of them were not even downloading anything illegal (open source / free linux iso is one common shared file).
➡ *THANKS FOR SHARING VIDEO GREAT WAY TO SHOW SUPPORT*
💻 *coreboot Laptop:* bmc.link/politictech/commissions (supports chan / crypt option)
🎗 *SUPPORT OPTIONS:* bmc.link/politictech
➡ *CLEARNET BLOG:* bmc.link/politictech/posts (follow to watch early content)
🧄 *I2P HOSTED BLOG:* righttoprivacy.i2p (watch videos anon / in advance)
*XMR:* 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
*CASHAPP:* cash.app/$HumanRightsTech
You hit the nail on the head when you say its Laziness!. I wish they would stop using "children" as an excuse. If that was true then they would ban fire-works, sugar, calories, sweets, fast-food, fizzy drinks, physical contact sport, social media, over violent cartoons and movies, etc etc etc. Great upload 👍
Exactly. Let's call 💩it what it is. 😅
Appreciate your feedback on this video.
100% pure laziness. It really does describe it well.
It's why they're really putting AI on phones, to monitor everything you do before it's encrypted.
How else can we convince everyone to volunteer said data 😜
Does this include the MVNO's that use the major carriers?
I'd imagine so, given the intended scope of the intercept portals.
You didn't explain the lawful intercept backdoor much. What systems have this backdoor?
I'm not aware of a public list of models (or if isolated to business vs consumer) w/may or may not carry capability. I would assume nearly all ISP hardware at some point.
Never hurts to control your own secondary router.
There is an interest in expanding capability / collection points - some reports suggest interest in certain of foreign dest etc.
But what I can say is 2 companies known: cisco, juniper (doesn't mean all models have intercept vulnerable hardware, but worth assuming - since this is a security risk).
You can search google to find publicly accessible documentation on the protocols for their hardware intercept portals if interested.
Maybe look up arris for fun (hardware used by one of largest isp). ;)
For example, in Korea, users of bittorrent were "hacked" / attacked / compromised by their own ISP, simply for being torrent users, even though many of them were not even downloading anything illegal (open source / free linux iso is one common shared file).
And they're worried about tiktok...
That's the narrative for us:
Tiktok bad. 🙄
Built in Backdoors good. 🤯
Actually makes perfect sense... if the goal were collecting data.
Its not a backdoor its a feature 🗿
Exactly what they tell us 🥲