• s38b35M5@lemmy.world
    link
    fedilink
    English
    arrow-up
    25
    ·
    edit-2
    1 day ago

    Important excerpt:

    “Introducing a scanning application on every mobile phone, with its associated infrastructure and management solutions, leads to an extensive and very complex system. Such a complex system grants access to a large number of mobile devices & the personal data thereon. The resulting situation is regarded by AIVD as too large a risk for our digital resilience. (…) Applying detection orders to providers of end-to-end encrypted communications entails too large a security risk for our digital resilience”.

    • EngineerGaming@feddit.nl
      link
      fedilink
      arrow-up
      2
      ·
      5 hours ago

      How tf do you even do that? I get how you would on a stock proprietary OS. But there are open OSes, and then how? Doubt something this complex and autonomous could be hidden like the XZ backdoor. If some OS complies - wouldn’t people fork it to remove the malware?

      And then there are desktops, which are much easier and more universal to make private…

  • Lazycog@sopuli.xyz
    link
    fedilink
    arrow-up
    21
    ·
    edit-2
    1 day ago

    Too bad politicians don’t have to base their decisions on an expert opinion. Any credible person will answer that this is a bad idea, but the issue is “easy and quick solutions to difficult problems”.

    • delirious_owl@discuss.online
      link
      fedilink
      arrow-up
      3
      ·
      9 hours ago

      Every time you have a child that’s abused, you have a child that’s abused.

      Seems like the solution to this is the normal ways we deal with child abuse: social workers and school counsels.

    • Deckweiss@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      1 day ago

      They’ll just du what they did before - “Our experts say: it’s perfectly safe and secure. No we won’t tell you the names of our experts to protect their privacy and personal safety”