Desiree Miloshevic wrote on 11/12/2024 09:52:
This article might be of interest to you. 


It's reassuring to see that at least some legislators are well-informed like this. Otherwise, nothing has changed in this argument since the encryption wars of the 1990s. The principle of subverting back doors is as old as the hills, as is the blindness to the consequences.

https://www.reuters.com/world/us-alleges-china-hacked-calls-very-senior-political-figures-official-says-2024-12-07/
https://www.theregister.com/2024/12/08/chinese_insiders_stealing_data/

The workaround to the recent Salt Typhoon hacks - a downstream consequence of what happens when lawful access is compromised  - was to make a recommendation to use ... strong encryption:

https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694

You can't invent this stuff.

Nick