• palordrolap@fedia.io
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      12 days ago

      Maybe, but they wouldn’t want to give away that such a thing definitely already exists. Also, any intelligence gathered that way would likely be inadmissible as evidence if it was used to prosecute someone.

      By getting an overt backdoor installed, both those problems go away.

    • melroy@kbin.melroy.org
      link
      fedilink
      arrow-up
      3
      arrow-down
      2
      ·
      11 days ago

      Depends on how good the e2e application is written. But yea, since android is still in the middle of data transfer, as well as IO of storage. Meaning both iOS and android can be the man the in the middle software that is tapping off the data even before it’s getting encrypted.

      Hopefully nobody is reading this from apple or Google, before I give them ideas. 😔