One Article Review

Accueil - L'article:
Source Chercheur.webp Schneier on Security
Identifiant 8609763
Date de publication 2024-11-12 12:05:32 (vue: 2024-11-12 12:07:41)
Titre Criminals Exploiting FBI Emergency Data Requests
Texte I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same thing is true for non-technical backdoors: The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information...
I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same thing is true for non-technical backdoors: The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information...
Notes ★★★
Envoyé Oui
Condensat “suffer about access accounts advisory backdoors backdoors: bad been bypass case cases cited claims companies company compromised create criminals cybercriminals data decades die” emails emergency encryption enforcement exploiting false fbi greatly guys human i’ve individual information law lawful like masquerading mechanism non now: one out police problem question requested requesting requests returns said same send some soon successful technical thing threats too trafficking true turns unless use user using will would writing
Tags Legislation
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: