• s38b35M5@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    edit-2
    2 months ago

    Important excerpt:

    “Introducing a scanning application on every mobile phone, with its associated infrastructure and management solutions, leads to an extensive and very complex system. Such a complex system grants access to a large number of mobile devices & the personal data thereon. The resulting situation is regarded by AIVD as too large a risk for our digital resilience. (…) Applying detection orders to providers of end-to-end encrypted communications entails too large a security risk for our digital resilience”.

    • EngineerGaming@feddit.nl
      link
      fedilink
      arrow-up
      7
      ·
      2 months ago

      How tf do you even do that? I get how you would on a stock proprietary OS. But there are open OSes, and then how? Doubt something this complex and autonomous could be hidden like the XZ backdoor. If some OS complies - wouldn’t people fork it to remove the malware?

      And then there are desktops, which are much easier and more universal to make private…