Originally posted by Jammrock
View Post
I'd expect something similar to be present as is the case for Microsoft Windows products, i.e. a NSA signing key that is accepted when installing OS updates (the famous 'NSAKEY' in Windows). Since NSA are very competent at hijacking network streams, they can insert their custom payload when a target system is using the built-in OS update functionality.
Inclusion of such a key would be requested through a national security letter, and there's no opportunity for the company to talk let alone admit receiving such a request, without breaking the law.
National security letters with these type of requests are much rumoured to be the cause for Lavabit and Truecrypt developers to wind down their operations (as the only way out on not wanting to comply with the requests).
So requests by the FBI like the current one to Apple, would suggest that agencies don't want to need to use their current backdoor for 'simple' things like access to repossessed phones and computers. I can think of some possible reasons for this:
- usage of the backdoor would become too frequent, driving up costs and increasing the knowledge of its existence among targets
- unless automatic OS updates are on, deployment of the custom payload may need to be triggered before repossession (a user may still need to consent to the update, so for optimal camouflage, the NSA would need to piggy-back their custom payload with a real OS update)
As for security and privacy conscious people, I would expect them not to use any devices and/or software written by American organisations, or developers in other countries with equally invasive government laws. That probably includes a large majority of countries in the world by now, with a clear tendency of this situation deteriorating further as time goes by.
i.e. a security-minded person is not going to choose a smartphone based on OS vendor (Apple/Google/MS), but rather would not carry a smartphone at all. Maybe at best consider an old dumb-phone with minimal integrated sensors (as snooping on calls doesn't require access to the phone itself, just to the network).
Comment