• @MonkderVierte@lemmy.ml
    link
    fedilink
    English
    32
    edit-2
    20 days ago

    From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions.

    Oh? It is possible? Pray tell, how?

    • @themurphy@lemmy.ml
      link
      fedilink
      English
      1019 days ago

      Screen recording or snapshots like Windows Recall. Or keyboard telemitry.

      But that’s it I think.

      • @Charlxmagne@lemmy.world
        link
        fedilink
        English
        1519 days ago

        It’s well known that iphone, google samsung and microsoft android keyboards are the most used keyloggers in the world.

        • Victor
          link
          fedilink
          English
          719 days ago

          I didn’t know that. Who do they send these logs to?

          • @Charlxmagne@lemmy.world
            link
            fedilink
            English
            2119 days ago

            The NSA and advertisers. It was confirmed the MS Android keyboards were keyloggers after microsoft suffered a data breach revealing millions of typing records, so it’s not far fetched to assume windows does the same, especially after you see the sheer amount of data being sent straight to microsoft servers when analysing traffic.