That secret screenshot folder would eat up your storage quite fast, and it would be known, from whistleblowers, workers having to check the screenshots, “proof coming out from it” etc etc etc
Comment on In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance
j4k3@lemmy.world 3 weeks ago
All mobile manufacturers could be doing this too. All of the SoCs are proprietary black boxes as are the modems.
Valmond@lemmy.world 3 weeks ago
plyth@feddit.org 3 weeks ago
Developed by Xerox and Canon in the mid-1980s, the existence of these tracking codes became public only in 2004.
j4k3@lemmy.world 3 weeks ago
There is certainly validity in the concept that no known instance of exploitation exists. However that is only anecdotal. The potential exists. Naïve trust in others has a terrible track record on these scales of ethics. Every instruction and register should be fully documented for every product sold.
An adequate webp image is only a few tens of kilobytes. Most people now have a bridged connection between their home network and cellular, unless they go out of their way to block it. Periodic screenshots are rather crazy. It would be much easier to target specific keywords and patterns.
kamen@lemmy.world 3 weeks ago
I’d be interested in how this documenting could be done. If you’re a manufacturer, you’d probably want to keep everything secret - except what’s needed for a patent for example - otherwise the competition might get an idea of the proprietary things you make in house.
Valmond@lemmy.world 3 weeks ago
Well are we putting people in prison with the help of them? A secret screenshot folder nobody can exploit isn’t very useful …
Not saying it can’t be done (you are of course right there), we hand it over freely often, but that the implications are not death to your family.
Clinicallydepressedpoochie@lemmy.world 3 weeks ago
You dont have to bring them to court with it for it to be useful. It could be used to target individuals theb they use more conventional methods to arrest then.
I would guess they arent currently doing it enmasse because that doesnt sound useful either. I would say, solely on a vibes based level its been done by US intelligence. Its really not so different then a wiretap.
silicon@lemmy.world 3 weeks ago
Let’s not forget sim cards are tiny computers as well.
thickertoofan@lemm.ee 3 weeks ago
I ve heard this a lot, how are modems black boxes?
j4k3@lemmy.world 3 weeks ago
No hardware documentation whatsoever. We don’t know what registers and instructions exist at the lowest levels.
As far as I am aware, there is no way to totally shut off and verify all cellular connections made, like to pass all traffic through a logged filter.
OsrsNeedsF2P@lemmy.ml 3 weeks ago
laughs in PinePho–
Sorry, my battery died as I was typing that