This seems like a very bad law to pass in the era of doorbell cameras on every building. I predict that this is going to be backfire almost immediately because cops are going to be caught eagerly breaking into premises to do this.
15
Majestic @lemmy.ml - 1w
I predict that this is going to be backfire almost immediately because cops are going to be caught eagerly breaking into premises to do this.
Eh. They're not that foolish if they're already going to the lengths of doing it this clandestinely. They'll just bring one of their robo-dogs with a WiFI jammer on it like DHS does these days. That or go in the back door. That or disconnect them from the internet by sending someone up a pole or to the utility cabinet down the street or a call to their ISP. It's really easy to get around most of those WiFI doorbells because they're reliant on 1) an active easily jammed wifi signal 2) internet.
Some are fancy enough to have SD card back-up but how often do most people check that? And I admit one could for only a bit more money put in an installation that would force them to tamper with it in a way that would leave tells for you but most cases this won't be an issue and in those where it is they'll probably just dress up like non-cop thugs and smash or cover the camera and most people wouldn't suspect that that was done for the cops to plant malware. They could also just cut power to your house long enough to enter, turn it back on once inside to install their stuff on your machines, radio and turn off again, exit, turn back on and all most people would know is your house lost power.
Thing is they've been allowed for a while to force ISPs to cooperate in doing man-in-the-middle to insert malware into software downloads on suspects in Germany.
::: spoiler Digression on that
So for example you (or your computer on its own as part of auto-update) go to update your totally cool game, your ISP under police orders slips in an altered update executable and unless the game checksum validates (and with your ISP's help they can impersonate any IP they want to possibly give their own checksum back, though whether they can/can choose to undermine certificate system by issuing false certificates is likely a bigger problem and not one normal cops can overcome if good practices (certificate chain pinning, not accepting say one issued from Nazi-State-ISP#2 instead of the expected one) are followed which they often aren't) it executes malware which yes grabs and downloads a real update for you but also installs police backdoor.
If you are in Germany or really paranoid anywhere you want to where possible check update files you download against the provided checksum or if more paranoid on virustotal to make sure they've been seen before and aren't totally new cop malware. Of course this can't protect you from auto-update mechanisms on a lot of software so if it's an active risk you need to ensure your computer while doing such things is connected to a VPN so your ISP cannot alter the transmitted data or even see it. A good firewall that controls connections can be used to prevent auto-updaters that aren't able to be configured not to auto-install from being vulnerable to this until such time you turn it off after connecting to a VPN. It's not generally a great idea to run out of date software though as it opens up more problems so you also have to be on top of regularly doing this.
:::
And obviously in cases like this the MitM protection won't help if they can just break in. At this point you need to fully encrypt your devices and have tamper-evident hardwired systems and automated alerts as well as investigate suspicious events like power or internet outages. And even that won't help you if they're resorting to implanting malware in firmware on your devices and have that ability which I'm soon the zionists will soon be selling if they aren't already. So basically start running TempleOS on an FPGA you keep locked in a safe in your basement under the watch of a hardwired camera system with back-up power and an unauthorized underground line to a cellular modem (with battery backup why not) you've installed in your neighbor's attic without their knowledge or permission which live-streams and records to two servers simultaneously located in Russia and Hong Kong.
11
Evilsandwichman [none/use name] - 1w
A German politician opposed to this should flat out say that if they're going to allow this, then they should also allow gun ownership
9
Belly_Beanis [he/him] - 1w
Gun ownership is allowed everywhere if you're brave enough.
8
Gosplan14_the_Third [none/use name] - 1w
doorbell cameras on every building
nah, those are kinda rare here. Most of the buildings are too old.
7
GrouchyGrouse [he/him] - 1w
So at this point I realize that the Holy Roman Empire wasn’t just a slapdash mishmash of feudal bullshit that accidentally grew over the Germanies like a wild thorn bush.
No. It was a carefully manicured garden. For over a thousand years it functioned like a puzzle box, locking the Germans from achieving statehood.
yogthos in europe
Berlin: Police can secretly enter homes for state trojan installation. Gestapo is back I guess.
https://www.heise.de/en/news/Berlin-Police-can-secretly-enter-homes-for-state-trojan-installation-11103284.htmlThis seems like a very bad law to pass in the era of doorbell cameras on every building. I predict that this is going to be backfire almost immediately because cops are going to be caught eagerly breaking into premises to do this.
Eh. They're not that foolish if they're already going to the lengths of doing it this clandestinely. They'll just bring one of their robo-dogs with a WiFI jammer on it like DHS does these days. That or go in the back door. That or disconnect them from the internet by sending someone up a pole or to the utility cabinet down the street or a call to their ISP. It's really easy to get around most of those WiFI doorbells because they're reliant on 1) an active easily jammed wifi signal 2) internet.
Some are fancy enough to have SD card back-up but how often do most people check that? And I admit one could for only a bit more money put in an installation that would force them to tamper with it in a way that would leave tells for you but most cases this won't be an issue and in those where it is they'll probably just dress up like non-cop thugs and smash or cover the camera and most people wouldn't suspect that that was done for the cops to plant malware. They could also just cut power to your house long enough to enter, turn it back on once inside to install their stuff on your machines, radio and turn off again, exit, turn back on and all most people would know is your house lost power.
Thing is they've been allowed for a while to force ISPs to cooperate in doing man-in-the-middle to insert malware into software downloads on suspects in Germany.
::: spoiler Digression on that So for example you (or your computer on its own as part of auto-update) go to update your totally cool game, your ISP under police orders slips in an altered update executable and unless the game checksum validates (and with your ISP's help they can impersonate any IP they want to possibly give their own checksum back, though whether they can/can choose to undermine certificate system by issuing false certificates is likely a bigger problem and not one normal cops can overcome if good practices (certificate chain pinning, not accepting say one issued from Nazi-State-ISP#2 instead of the expected one) are followed which they often aren't) it executes malware which yes grabs and downloads a real update for you but also installs police backdoor.
If you are in Germany or really paranoid anywhere you want to where possible check update files you download against the provided checksum or if more paranoid on virustotal to make sure they've been seen before and aren't totally new cop malware. Of course this can't protect you from auto-update mechanisms on a lot of software so if it's an active risk you need to ensure your computer while doing such things is connected to a VPN so your ISP cannot alter the transmitted data or even see it. A good firewall that controls connections can be used to prevent auto-updaters that aren't able to be configured not to auto-install from being vulnerable to this until such time you turn it off after connecting to a VPN. It's not generally a great idea to run out of date software though as it opens up more problems so you also have to be on top of regularly doing this.
:::
And obviously in cases like this the MitM protection won't help if they can just break in. At this point you need to fully encrypt your devices and have tamper-evident hardwired systems and automated alerts as well as investigate suspicious events like power or internet outages. And even that won't help you if they're resorting to implanting malware in firmware on your devices and have that ability which I'm soon the zionists will soon be selling if they aren't already. So basically start running TempleOS on an FPGA you keep locked in a safe in your basement under the watch of a hardwired camera system with back-up power and an unauthorized underground line to a cellular modem (with battery backup why not) you've installed in your neighbor's attic without their knowledge or permission which live-streams and records to two servers simultaneously located in Russia and Hong Kong.
A German politician opposed to this should flat out say that if they're going to allow this, then they should also allow gun ownership
Gun ownership is allowed everywhere if you're brave enough.
nah, those are kinda rare here. Most of the buildings are too old.
So at this point I realize that the Holy Roman Empire wasn’t just a slapdash mishmash of feudal bullshit that accidentally grew over the Germanies like a wild thorn bush.
No. It was a carefully manicured garden. For over a thousand years it functioned like a puzzle box, locking the Germans from achieving statehood.
Bismarck. That motherfucker.