That secret screenshot folder would eat up your storage quite fast, and it would be known, from whistleblowers, workers having to check the screenshots, “proof coming out from it” etc etc etc
Comment on In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance
j4k3@lemmy.world 3 days ago
All mobile manufacturers could be doing this too. All of the SoCs are proprietary black boxes as are the modems.
Valmond@lemmy.world 3 days ago
plyth@feddit.org 3 days ago
Developed by Xerox and Canon in the mid-1980s, the existence of these tracking codes became public only in 2004.
j4k3@lemmy.world 3 days ago
There is certainly validity in the concept that no known instance of exploitation exists. However that is only anecdotal. The potential exists. Naïve trust in others has a terrible track record on these scales of ethics. Every instruction and register should be fully documented for every product sold.
An adequate webp image is only a few tens of kilobytes. Most people now have a bridged connection between their home network and cellular, unless they go out of their way to block it. Periodic screenshots are rather crazy. It would be much easier to target specific keywords and patterns.
kamen@lemmy.world 3 days ago
I’d be interested in how this documenting could be done. If you’re a manufacturer, you’d probably want to keep everything secret - except what’s needed for a patent for example - otherwise the competition might get an idea of the proprietary things you make in house.
Valmond@lemmy.world 3 days ago
Well are we putting people in prison with the help of them? A secret screenshot folder nobody can exploit isn’t very useful …
Not saying it can’t be done (you are of course right there), we hand it over freely often, but that the implications are not death to your family.
Clinicallydepressedpoochie@lemmy.world 3 days ago
You dont have to bring them to court with it for it to be useful. It could be used to target individuals theb they use more conventional methods to arrest then.
I would guess they arent currently doing it enmasse because that doesnt sound useful either. I would say, solely on a vibes based level its been done by US intelligence. Its really not so different then a wiretap.
silicon@lemmy.world 3 days ago
Let’s not forget sim cards are tiny computers as well.
thickertoofan@lemm.ee 3 days ago
I ve heard this a lot, how are modems black boxes?
j4k3@lemmy.world 3 days ago
No hardware documentation whatsoever. We don’t know what registers and instructions exist at the lowest levels.
As far as I am aware, there is no way to totally shut off and verify all cellular connections made, like to pass all traffic through a logged filter.
OsrsNeedsF2P@lemmy.ml 3 days ago
laughs in PinePho–
Sorry, my battery died as I was typing that