Police could lawfully use bulk surveillance techniques to access messages from encrypted communications platforms such as WhatsApp and Signal, following a ruling by the UK’s Investigatory Powers Tribunal (IPT), a court has heard.
[deleted]
Submitted 3 months ago by Sunny@slrpnk.net to technology@lemmy.world
Police could lawfully use bulk surveillance techniques to access messages from encrypted communications platforms such as WhatsApp and Signal, following a ruling by the UK’s Investigatory Powers Tribunal (IPT), a court has heard.
Tell me you haven’t read the article without telling me you haven’t read the article.
Also you seem to have no clue what you’re talking about.
I don’t use Google. I haven’t used Google in… I dunno, a decade? They offer no services that are better than the competition. In fact, the only quality thing they ever made was Google maps.
And now openstreetmaps is just as good – worse for car, better for biking and walking, really depends for public transit
Zak@lemmy.world 3 months ago
The headline is a little misleading. The actual ruling is that police can obtain warrants to install surveillance malware on phones when they have evidence the owner is using it to communicate about crimes.
NarrativeBear@lemmy.world 3 months ago
Could malware be installed without access to the physical phone? How would this be achieved. Is it with a backdoor from the phone manufacturer or infected somehow from the sim card service provider.
Plopp@lemmy.world 3 months ago
Depending on circumstances it can be done remotely in different ways AFAIK using things like IMSI Catchers, malicious and sometimes invisible SMS messages, and maybe spearfishing or other methods. Or a combination of things, leveraging different weaknesses of the phone in question.
ichbinjasokreativ@lemmy.world 3 months ago
Can be done remotely on any mobile platform. Look up pegasus if you’re interested.
aodhsishaj@lemmy.world 3 months ago
Likely as not, person charged with crime is in custody. Police force person to unlock phone, then police install malware and wait for comms to come in.
pwalker@discuss.tchncs.de 3 months ago
Well just recently researchers discovered a campaign installing backdoors on iPhones using a chain of several 0-day expoits or in this case using also 0-click exploits, where no interaction from a user is needed. However those attack chain are so advanced that practically normal law enforcement would never be able to do it. But theoretically yes some well equiped state actors are able to infect you without noticing. If you are really intrested to see how advanced these attack are search for “project triangulation” or watch the recording from last years chaos computer conference: …ccc.de/…/37c3-11859-operation_triangulation_what…
conciselyverbose@sh.itjust.works 3 months ago
I think this is their point. The additional links are walled, but the assertion it sounds to me like they’re making is that the ruling authorized them to hack and surveil an entire platform, rather than based on probable cause against specific individuals.