this post was submitted on 09 Aug 2025
70 points (100.0% liked)

Technology

3838 readers
533 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Post guidelines

[Opinion] prefixOpinion (op-ed) articles must use [Opinion] prefix before the title.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution


If someone is interested in moderating this community, message @brikox@lemmy.zip.

founded 2 years ago
MODERATORS
 

Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.

top 10 comments
sorted by: hot top controversial new old
[–] homesweethomeMrL@lemmy.world 18 points 5 days ago (1 children)

The flaws remained unknown publicly until their disclosure, because ETSI refused for decades to let anyone examine the proprietary algorithms.

Cool

[–] 9point6@lemmy.world 9 points 5 days ago (1 children)

Well I'm sure if you're a criminal trying to access police radio and you figure it out, it's not really in your interests to let everyone know about it

[–] untorquer@lemmy.world 1 points 4 days ago

Arguably true even if you're not a criminal

[–] homesweethomeMrL@lemmy.world 12 points 5 days ago

Brian Murgatroyd, former chair of the technical body at ETSI

Heavens!

[–] ArcaneSlime@lemmy.dbzer0.com 4 points 4 days ago

Brian Murgatroyd, former chair of the technical body at ETSI responsible for...

Heavens to Murgatroyd

[–] possiblylinux127@lemmy.zip 5 points 5 days ago

Wait until you see enterprise equipment

[–] 01189998819991197253 2 points 4 days ago

I thought this was a known thing. We used to listen in as kids.

[–] Lushed_Lungfish@lemmy.ca 2 points 5 days ago (2 children)

It's why we use code.

"The cheese is mouldy in the kitchen."

"The rolling rabbit gathers no dust."

[–] possiblylinux127@lemmy.zip 9 points 5 days ago

The Navajo have entered the chat

[–] the_crotch@sh.itjust.works 2 points 4 days ago

The chair is against the wall. John has a long mustache.