Hacker News new | past | comments | ask | show | jobs | submit login

And most of that wouldn’t be useful. We use encryption for almost everything now for a reason.

No, wiretaps on modern networks do not rely on backdoors, or even big labeled front doors like SSH, on individual subscriber devices. Instead it is built into the lower level routing. When an ISP gets a warrant (or whatever relevant document your country uses) they configure their routers to tag all of your traffic and mirror it to a server to be recorded. It’s entirely invisible to the subscriber, and highly automated.




> And most of that wouldn’t be useful. We use encryption for almost everything now for a reason.

The topic at hand is local network access. Some examples of things happening on your local network that you might not want Elon/ISP to see:

- Many people have public shares on their NAS for things like media or family photos

- Security cameras

- Printers

- If you're casting, the title of everything you watch is broadcasted on the network

- Even if you're not casting, if you use an Android TV then the title of everything you watch is also broadcasted to the network by default

- The list of all your devices

- If you torrent things, then the hash of all your torrents is likely broadcasted to your local network (through Local Peer Discovery)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: