this post was submitted on 26 Mar 2025
540 points (99.3% liked)

Technology

68186 readers
6150 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

One of the most basic tenets of cybersecurity is that you must “consider your threat model” when trying to keep your data and your communications safe, and then take appropriate steps to protect yourself.

This means you need to consider who you are, what you are talking about, and who may want to know that information (potential adversaries) for any given account, conversation, etc. The precautions you want to take to protect yourself if you are a random person messaging your partner about what you want to eat for dinner may be different than those you’d want to take, if, hypothetically, you are the Secretary of Defense of the United States or a National Security Advisor talking to top administration officials about your plans for bombing an apartment building in Yemen.

you are viewing a single comment's thread
view the rest of the comments
[–] liverbe@lemmy.world 19 points 1 week ago (2 children)

Which also means these conversations were on an unapproved app on an unapproved device. Actual government phones wouldn't be able to get Signal, right?

[–] solrize@lemmy.world 19 points 1 week ago* (last edited 1 week ago) (3 children)

Government secure phones are special hardware made by the NSA. They are nothing like civilian phones. Obama got the NSA to lock down his Blackberry but I doubt that is doable with today's mainstream smartphones.

https://en.m.wikipedia.org/wiki/STU-III

[–] 9488fcea02a9@sh.itjust.works 2 points 6 days ago (1 children)

The last stu-3 stopped working in 2009.

[–] solrize@lemmy.world 3 points 6 days ago

Yes they have different stuff now, but same idea.

[–] ricecake@sh.itjust.works 5 points 1 week ago

I actually wouldn't be shocked if it was possible with modern smartphones. A significant amount of money is available to be made from federal security work, and meeting the NSA criteria has benefits that extend to companies that work in the federal security space as well.

[–] 0xD@infosec.pub 1 points 1 week ago

As long as you can flash them, everything's possible.

In that spirit: Fuck Apple to hell.

[–] darkdemize@sh.itjust.works 10 points 1 week ago

I have a government-issued iPhone. It has Signal on it, and I have access to the appstore. It's also not allowed to be used for anything but unclassified communication and isn't permitted inside restricted areas.