I think because there is so many surveillance built into proprietary software, companies like U.S. probably can just ask for any information from Apple, Google, Facebook, Microsoft when they need it.
On the other hand, countries like China and Russia would need to compromise these product like Jia Tan did. Except for Apple, because every apple service in China is maintained by a Chinese company with no encryption allowed.
Blaster_M@lemmy.world 5 months ago
You only know this happened because one dev was benchmarking their system and noticed a 0.5s anomaly in resource usage, and was able to track it down to this. For every one of these that are caught, there are countless more that slip past.
Cataphract@lemmy.ml 5 months ago
I actually look at it a completely different way. There are so many users optimizing and digging into the core of open source versus proprietary that with so many randoms actions there’s less “vulnerable” dark spots available. If we think there’s a limitless X amount of vulnerabilities (since we don’t know the true ceiling limit), open source will always be “X (vulnerabilities) - 1” compared to proprietary. Completely a math metaphor but gets the point across, It’s a path that lessens the impact which we should be striving for over profit/monopoly motives.