this post was submitted on 24 Mar 2026
634 points (99.4% liked)

Technology

83040 readers
3945 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] ayyy@sh.itjust.works 4 points 11 hours ago (1 children)

It is entirely true that all models from all manufacturers are compromised by spy agencies. However the worst offender by far is Cisco even though they’re “American”.

[–] UnderpantsWeevil@lemmy.world 2 points 10 hours ago

It is entirely true that all models from all manufacturers are compromised by spy agencies.

I think there's a little bit of space between "spy agencies employ systems professionals that know the guts of a component's security and tricks to bypass it" and "every device firmware has a double super secret protocol for sidestepping all of its security features".

However the worst offender by far is Cisco even though they’re “American”.

Sure. I'm willing to believe that Cisco, specifically, has relationships with the Five Eyes network such that they make monitoring their traffic easier. Even then, there's limits. One thing to say techniques exist to bypass security. Another entirely to know what those techniques are and whether they're practical for application at universal scale.

One of the more chronic problems that big spy agencies have is sifting through all the spam and bullshit and empty chatter. Decryption takes time. And you can't monitor everything, everywhere, all at once. The bigger sins of Cisco are in how they expedite access on behalf of their agency partners, not that they fail to produce perfectly hack-proof hardware.