Discussion in 'Article Discussion' started by bit-tech, 24 May 2019.
So have they used an overgrown insider or just a tool?
Sounds about right. You put enough people in charge of what must be mostly nudes and some are going to fall foul of the temptation to look.
I wonder if there's any logging as to who used the tools, when, and for what reason.. I'm betting 'no'.
I pity the foo who used the internal too
Annoyingly, I fixed that before publishing - but failed to notice it had reverted the changes. Fixed again, ta!
To paraphrase myself from one of the many "The UK government wants to abolish privacy" threads:
One way for law enforcement to access your data is for the company providing you with a communication service to have pre-emptive access to your data (so it can be handed over when requested), however the company can't be trusted to not abuse that access.
Thank you Snapchat for proving my point.
Or more generalised: If it's not end-to-end encrypted, AND you don't hold control of the encryption key(s) yourself, then it's not private. It can still not be private if those two are true (e.g. poor implementation, backdoor, screen-snooping), but it cannot be private if either are not true.
Separate names with a comma.