• Aceticon@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    1 year ago

    The IT Security definition of a “backdoor” is: something that provides open access to the data without the knowledge or control of the owners of the data - who are typically the users.

    There’s nothing about the legality or not of it or the company that makes the software being aware of it, which is why sometimes you get news about how a software maker having bing discovered to have a “backdoor” in their software and many of the ways the Chinese Government forces companies to provide access to user data, whilst being 100% legal (just like the US) are described as “backdoors”.

    From the point of view of IT Security specialists a technique having been endorsed by members-of-parliament/senators/congressmen/governments/presidents/monarchs/whatever or not is relevant for the naming of that technique - if it provides access to user data without user knowledge or control it’s a “backdoor” and using it is “backdoor access”.

    So it’s funny (sad funny rather than “ha ha” funny) how in (mainly American) newsmedia stuff which is 100% legal in China is described as a “backdoor” but the exact same techniques when 100% legal in the US are not describe as “backdoors” whilst technically being exactly that: honest and unbiased news would deem both backdoors or not depending on their characteristics (i.e. are they means of open access to user data without the knowledge of the owners of the data).

    It’s unclear if FISA warrants have been used or not to force companies to provide what are (per the technical definition) “backdoors” in actual software implementations, but as we know thanks to Snowden they certainly did force some companies to provide NSA with free realtime access to their systems, and having a NSA server getting copies of any user communications passing through a mobile phone provider is technically “backdoor access” to their systems.

    In summary, Engineering doesn’t care about politics when naming technuques and beware that legality isn’t the same as morality: all the shit that China does is just as as legal as all the shit the US does - after all, the people who make the laws are the one who authorized it.

    • Steeve@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      1 year ago

      We can disagree about the definition of “backdoor access” all day, but you’re still glossing over the context of the conversation, which is that the American tech listed above does not provide additional access to data that Chinese tech isn’t also forced to comply to.

      • Aceticon@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        1 year ago

        This is exactly what you wrote:

        None of those companies give “backdoor access”. All information has to be obtained legally via a warrant.

        I pointed out that legality is not part of the definition of “backdoor access”, so the second part of your statement does not at all not support the first part so your entire argument in that post is unsupported.

        I don’t even disagree that “American tech listed above does not provide additional access to data that Chinese tech isn’t also forced to comply to” - sadly, the limits on the subversion of American tech for surveillance seems to be only technical (as Snowden’s revelations abundantly showed, the Law is not the limiting factor for surveillance in the US), so American tech probably provides the exact same level of additional access to data as Chinese tech and should be treated with the same distrust.

        However I merelly responde to that very specific, very assured statement you made, which is simply wrong in technical terms.