• adarza@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    any ‘lawful’ access that’s baked-in will also be used and exploited ‘unlawfully’.

  • NutWrench@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    It’s not my responsibility to make the FBI’s job (or any cop’s job) easier.

    Also, folks should be using 3rd party open-source encryption, like VeraCrypt and a password manager that encrypts the database, like Keepass. Don’t ever expect governments and corporations to respect your privacy.

  • unknown1234_5@kbin.earth
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    There is no ‘lawful access’ without a warrant or my permission. there aren’t laws saying padlocks need to support a government master key, and encryption is just a digital lock.

    • Octagon9561@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      That’s literally what TSA approved locks are… Of course the master keys are freely available to everyone.

      • unknown1234_5@kbin.earth
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        yeah, which is why we need to make sure that doesn’t happen to other locks (and make the TSA start doing security instead of security theater).

      • unknown1234_5@kbin.earth
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        Bolt cutters are not a key, they are a method of bypassing the lock. they still need a warrant to do that, which is the point.

  • Stormy1701@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    What if we don’t store it in the cloud and keep local encrypted storage only? I guess Mr FBI is shit out of luck then.

    How do we live in a world where local storage is now the only safe choice?