Archived

U.S. government officials said that the China-backed hacking group dubbed Salt Typhoon are still inside some of the networks of America’s largest phone and internet providers, weeks after the long-running hacking campaign first came to light.

Cybersecurity agency CISA said in a call with reporters the affected telecom giants are still trying to evict the hackers, in part because it’s unclear what the hackers are aiming to accomplish.

News first broke in October that Salt Typhoon was reportedly deep inside the networks of AT&T, Verizon, and Lumen (formerly CenturyLink), among others. T-Mobile said it was targeted but largely rebuffed the attackers. The access allowed the Chinese hackers to access real-time unencrypted calls and text messages, as well as metadata about who the communications were sent to and from, as they traveled over the phone carriers’ networks.

U.S. officials believe the industry-wide hacks may be China trying to carry out a wide-ranging spying operation, as the hackers were found accessing the communications of U.S. officials and senior Americans, including presidential candidates. Salt Typhoon is also believed to be targeting systems that house much of the U.S. government’s requests, which may help to identify Chinese individuals under U.S. government surveillance.

“Encryption is your friend; whether it’s on text messaging or if you have the capacity to use encrypted voice communication,” said the CISA official.

  • Rikj000@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    33
    ·
    17 days ago

    This is actually quite good news!
    Hear me out though.

    Encryption has been under attack by government instances for a while now.

    They always aim to weaken / backdoor it,
    so that they can spy on all their citizens.

    China abused the backdoor implemented by the US government,
    which sends a message across the world,
    being: “Do not backdoor encryption to spy on your citizens, or other countries might abuse it

    Hopefully this will put a stop to governments attacking encryption, at least for a while,
    since now they’re reminded of the risks which it brings! :)

    • thelucky8@beehaw.orgOP
      link
      fedilink
      arrow-up
      29
      ·
      edit-2
      17 days ago

      Yes, I would also have a nitpick for the authorities (and journalists who report on the issue) in that China didn’t hack the providers, it hacked the U.S. Wiretap system. This is an important detail. There is no such thing as a ‘backdoor only for the good guys’.

  • i_am_not_a_robot@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    16
    ·
    17 days ago

    Encryption when it protects you from China: “Encryption is your friend”
    Encryption when it protects your constitutional rights: “What are you hiding?”

    • 𝕸𝖔𝖘𝖘@infosec.pub
      link
      fedilink
      English
      arrow-up
      4
      ·
      17 days ago

      Don’t worry. The apps they want you to use definitely don’t have backdoors for them to use to circumvent all encryption, and those nonexistent backdoors will definitely not be found by other bad actors.

    • WilfordGrimley@linux.community
      link
      fedilink
      English
      arrow-up
      6
      ·
      16 days ago

      Signal Private Messenger is free open source, works on everything. Your grandma could use this.

      I have slowly migrated all of my friends and family to this over the last few years.

      All of the big ‘encrypted’ messengers like WhatsApp or Facebook Messenger use the Signal Protocol under the hood but insert their own shady business and tracking defeating a lot of the purpose.

      There are other perhaps more anonymous options like SimpleX or XMRchat but they are not practical nor needed for most threat models.

      Matrix is not quite mature enough but is a better option than discord for gaming communities.

      Signal everyday. I would not recommend Telegram. DYOR.

      • sp3ctr4l@lemmy.zip
        link
        fedilink
        English
        arrow-up
        4
        ·
        16 days ago

        Yep, Signal has been the obvious best combination of actual security and ease of use for quite a while now…

        But most people that I interact with are still on the level of ‘everyone knows Apple is more secure than Android, so anything on an iPhone is fine’ or ‘wtf undont have a SnapChat? Everyone has a snapchat’.

  • thelucky8@beehaw.orgOP
    link
    fedilink
    arrow-up
    3
    ·
    16 days ago

    XMPP maybe?

    I also tink SimpleX Chat is a good alternative.

    I wouldn’t recommend Signal (only the client is open source, the server is from Amazon, and you have to provide your phone number).

    • Lime Buzz@beehaw.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      16 days ago

      XMPP is terrible for the average user, its encryption (OMEMO) in most clients is not the latest version of it (making it weak) and can be turned off, a bad thing for an encrypted messenger. Plus verification requires comparing a string of numbers in most cases, something most users do not want to do or would find it difficult to accurately.

      SimpleX Chat has not proven itself to be legal request resistant yet (they seem not to have any information on requests recieved) and does not have many audits. Plus it is very barebones and has bad UX. Until they fix these things it will not be attractive to most typical folks.

      • thelucky8@beehaw.orgOP
        link
        fedilink
        Deutsch
        arrow-up
        3
        ·
        16 days ago

        Yes, I know of the OMEMO issues. Most users would probably find that too difficult (although it isn’t imo). It’s very hard to convince people of more secure, non-mainstream tools, unfortunately.

        • Lime Buzz@beehaw.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          13 days ago

          I believe that had improved recently, especially due to funding from the original creator of Twitter and Bluesky.

          Though in general yes, apps that are about ‘extreme’ privacy tend to be as they like to avoid the big corporate tech servers for notifications etc whenever possible and probably other things too meaning they have to use more power in order to get the same results as the ones that do use them.