ModerateImprovement@sh.itjust.works to Technology@lemmy.worldEnglish · 1 year agoCrooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comexternal-linkmessage-square31fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comModerateImprovement@sh.itjust.works to Technology@lemmy.worldEnglish · 1 year agomessage-square31fedilink
minus-squareSaltySalamander@fedia.iolinkfedilinkarrow-up0·1 year agoAs long as computers are networked, there will always be data breaches. Doesn’t matter what form of gov’t or economy you live under.
minus-squaremipadaitu@lemmy.worldlinkfedilinkEnglisharrow-up0·1 year agoUnless the data isn’t actually stored. You can’t have a data breach if the data doesn’t exist.
minus-squareEntropywins@lemmy.worldlinkfedilinkEnglisharrow-up0·1 year agoYou can absolutely capture data in transmission
minus-squareaStonedSanta@lemm.eelinkfedilinkEnglisharrow-up0·1 year agoYes but if the connection is encrypted E2E you can’t reliably afaik
minus-squareJJROKCZ@lemmy.worldlinkfedilinkEnglisharrow-up0·1 year agoYes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”
As long as computers are networked, there will always be data breaches. Doesn’t matter what form of gov’t or economy you live under.
Unless the data isn’t actually stored. You can’t have a data breach if the data doesn’t exist.
You can absolutely capture data in transmission
Yes but if the connection is encrypted E2E you can’t reliably afaik
Yes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”