ModerateImprovement to Technology@lemmy.worldEnglish · 7 个月前Crooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comexternal-linkmessage-square18fedilinkarrow-up1202arrow-down11cross-posted to: [email protected][email protected]
arrow-up1201arrow-down1external-linkCrooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comModerateImprovement to Technology@lemmy.worldEnglish · 7 个月前message-square18fedilinkcross-posted to: [email protected][email protected]
minus-squareAnarchoNoAdjective@lemmy.mllinkfedilinkEnglisharrow-up57arrow-down3·7 个月前“Noting that some of the records included data that could be used to determine where a call was made or text message sent” Data breaches in surveillance capitalism. Very cool, very normal.
minus-squareSaltySalamander@fedia.iolinkfedilinkarrow-up14arrow-down1·7 个月前As long as computers are networked, there will always be data breaches. Doesn’t matter what form of gov’t or economy you live under.
minus-squaremipadaitu@lemmy.worldlinkfedilinkEnglisharrow-up34·7 个月前Unless the data isn’t actually stored. You can’t have a data breach if the data doesn’t exist.
minus-squareEntropywins@lemmy.worldlinkfedilinkEnglisharrow-up6·7 个月前You can absolutely capture data in transmission
minus-squareJJROKCZ@lemmy.worldlinkfedilinkEnglisharrow-up6·7 个月前Yes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”
minus-squareaStonedSanta@lemm.eelinkfedilinkEnglisharrow-up4arrow-down1·7 个月前Yes but if the connection is encrypted E2E you can’t reliably afaik
“Noting that some of the records included data that could be used to determine where a call was made or text message sent”
Data breaches in surveillance capitalism. Very cool, very normal.
As long as computers are networked, there will always be data breaches. Doesn’t matter what form of gov’t or economy you live under.
Unless the data isn’t actually stored. You can’t have a data breach if the data doesn’t exist.
You can absolutely capture data in transmission
Yes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”
Yes but if the connection is encrypted E2E you can’t reliably afaik