• MonkderVierte@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    5 hours ago

    From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions.

    Oh? It is possible? Pray tell, how?