Chinese Hackers Compromise Lawful Intercept

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 18

  • @RTPTechTips
    @RTPTechTips  Месяц назад

    ➡ *THANKS FOR SHARING VIDEO GREAT WAY TO SHOW SUPPORT*
    💻 *coreboot Laptop:* bmc.link/politictech/commissions (supports chan / crypt option)
    🎗 *SUPPORT OPTIONS:* bmc.link/politictech
    ➡ *CLEARNET BLOG:* bmc.link/politictech/posts (follow to watch early content)
    🧄 *I2P HOSTED BLOG:* righttoprivacy.i2p (watch videos anon / in advance)
    *XMR:* 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
    *CASHAPP:* cash.app/$HumanRightsTech

  • @kelvin-nz
    @kelvin-nz Месяц назад +3

    You hit the nail on the head when you say its Laziness!. I wish they would stop using "children" as an excuse. If that was true then they would ban fire-works, sugar, calories, sweets, fast-food, fizzy drinks, physical contact sport, social media, over violent cartoons and movies, etc etc etc. Great upload 👍

    • @RTPTechTips
      @RTPTechTips  Месяц назад

      Exactly. Let's call 💩it what it is. 😅
      Appreciate your feedback on this video.

    • @DextersLab93
      @DextersLab93 27 дней назад

      100% pure laziness. It really does describe it well.

  • @907-q7u
    @907-q7u Месяц назад +1

    It's why they're really putting AI on phones, to monitor everything you do before it's encrypted.

    • @RTPTechTips
      @RTPTechTips  Месяц назад +1

      How else can we convince everyone to volunteer said data 😜

  • @mnoxman
    @mnoxman Месяц назад

    Does this include the MVNO's that use the major carriers?

    • @RTPTechTips
      @RTPTechTips  Месяц назад

      I'd imagine so, given the intended scope of the intercept portals.

  • @quarteratom
    @quarteratom Месяц назад

    You didn't explain the lawful intercept backdoor much. What systems have this backdoor?

    • @RTPTechTips
      @RTPTechTips  Месяц назад

      I'm not aware of a public list of models (or if isolated to business vs consumer) w/may or may not carry capability. I would assume nearly all ISP hardware at some point.
      Never hurts to control your own secondary router.
      There is an interest in expanding capability / collection points - some reports suggest interest in certain of foreign dest etc.
      But what I can say is 2 companies known: cisco, juniper (doesn't mean all models have intercept vulnerable hardware, but worth assuming - since this is a security risk).
      You can search google to find publicly accessible documentation on the protocols for their hardware intercept portals if interested.
      Maybe look up arris for fun (hardware used by one of largest isp). ;)

    • @RTPTechTips
      @RTPTechTips  Месяц назад

      For example, in Korea, users of bittorrent were "hacked" / attacked / compromised by their own ISP, simply for being torrent users, even though many of them were not even downloading anything illegal (open source / free linux iso is one common shared file).

  • @bhambhole
    @bhambhole Месяц назад

    And they're worried about tiktok...

    • @RTPTechTips
      @RTPTechTips  Месяц назад +1

      That's the narrative for us:
      Tiktok bad. 🙄
      Built in Backdoors good. 🤯
      Actually makes perfect sense... if the goal were collecting data.

  • @notafbihoneypot8487
    @notafbihoneypot8487 Месяц назад

    Its not a backdoor its a feature 🗿

    • @RTPTechTips
      @RTPTechTips  Месяц назад

      Exactly what they tell us 🥲