I just read @dreamtales most recent post detailing how AI assistant programs now deployed in all Apple, Microsoft, and Google products eliminate encryption by accessing all keystrokes and aural data (particularly verbal communications) in proximity to devices. A week ago it was revealed by the USG that hostile foreign adversaries have gained access to the US telecommunications network, and are not able to be excluded from it. As long as proprietary hardware and software are able to access the global telecommunications network, hostile actors cannot be excluded from the US telecommunications network.
IMG source - Forums.Obsidian.net
By combining AI assistant technology, that is currently deployed on Apple, Microsoft, and Google products, with covert uninterruptible access to the communications network, hostile foreign adversaries can take control of all assets able to be accessed from that network. Mechanisms to compromise air gapped systems have also been created, for example Stuxnet.
This has already happened, and is in the process of happening as we speak.
By all assets I mean all financial accounts, everything communicated online, stored in a personal device, or that has been verbally discussed in proximity to an Apple, Microsoft, Google, or covertly compromised device.
This hostile hacker presence on the communications network has access to the AI assistant software that Apple, Microsoft, and Google deploy because they can gain access to the passwords of each and every technician, manager, and executive of each of those companies. By being a covert presence on the telecommunications network with access to the UI level data AI assistant software has, the hostile actor(s) can gain access to every password of every account online and every device because they can infiltrate their covert proprietary AI software. Because they did not interfere with the access of the personal devices they originally hacked, they are able to use that access to the branded assistant software to then gain access to all persons using devices running any of the AI assistant softwares. It must be assumed they have gained access to all proprietary AI assistant software, and have infiltrated their own proprietary AI software, daisy chaining from insecure user devices to devices that may be secure from proprietary AI assistant software.
AI assistant software has made encryption irrelevant for every agency, corporation, and device on Earth. AI access at the UI level as deployed already by Apple, Microsoft, and Google has made that information available to the telecommunications network because those companies exfiltrate that user data via the telecommunications network. While each of the companies deploying their product may have thought only themselves to possess only their proprietary data, because it is communicated across the network it has been, and remains, available to hostile foreign adversaries. All of them are compromised (probably by each other), and are providing their proprietary data to the hostile foreign adversary(s), each of them pwning themselves and the hostile hacker(s) availed of all proprietary AI assistants, and thereby to all UI level user data and all passwords to all accounts extant. It takes time to acquire all such data, and because it has not yet been used to take over the world, insufficient access has been acquired to do that yet. Data acquisition remains ongoing.
Some may use a dongle providing hardware encryption. However, the backdoors that have been manufactured into every proprietary commercial chipset available to the market compromise every dongle to the state actors that thought they alone would have access to that hardware level backdoor. Because that backdoor mechanism is transmitted on the telecommunications network, and state actors passwords and encryption on devices they personally use are compromised, all that information has become available to AI assistant software (including covert AI software used by hostile adversary(s)), and thus to the hostile foreign adversary(s) accessing the telecommunications network. Backdoor data on proprietary devices has been compromised by AI software, or will be. Covert state actors have contrived proprietary backdoors for their exclusive use, and no longer can exclusively access that data.
We can assume that the hostile foreign adversary(s) on the telecommunications network have not yet gained all the data from the hardware encryption and all passwords to all financial and other accounts yet, because they have not yet acted to assume unitary executive control of the world. Therefore eliminating the AI assistant software and UI level access of Apple, Microsoft, and Google (or other) software to every device, and all hardware backdoors manufactured in, can still prevent that capture of everything. This would leave only those accounts already captured vulnerable, and once open source hardware and software are able to exclude non-user capture of proprietary user data from their personal devices, that account access can be changed and restored to a secure state by enabling end to end encryption to exclude covert access. This means that all private keys and devices must be able to be private, without any backdoor available to state, or other, actors. Only that can enable end to end encryption, and only that can enable excluding hostile adversaries from pwning data communicated across telecommunications networks and all accounts access thereby.
The only mechanism to prevent an adversary from gaining the passwords to all accounts is to end UI level access of Apple, Microsoft, and Google - and any other entity - to users devices. Because each speaker is also a microphone, and each monitor is also a camera (physics works in both directions) clever algorithms can covertly record any device running proprietary software or manufactured with proprietary hardware that can be backdoored at the factory. The only way to provide security to any device is to make all hardware and software open source. Proprietary hardware and software cannot be secure.
All UI level user data must be proprietary to the user and the security of that data must be verifiable through open source hardware and software, or AI assistant software (overt or covert) can compromise every account and all data created by that user. All user devices must prevent access to the device by anyone or anything other than the user. Any hardware or software access to user devices will compromise national security by enabling AI assistant software to gain UI level access to keystrokes and aural data in the proximity of the device, which can then be used to gain access to any users or devices that compromised device interacts with, which will daisy chain to national security access. Additionally biometric data must be not used to provide security for digital accounts or devices.
India has mandated biometric ID for it's population. Today for ~$80k you can buy the biometric data of ~1/2 of the Indian population. Because this data is transmitted on the telecommunications network (and stored in insecure databases) any hostile adversary can gain this biometric data (which has occurred). Then all accounts secured by that biometric data can be compromised by hostile adversary(s), and the user cannot change their biometric data. Every biometric data accessible account can be compromised permanently. Biometric ID cannot be secured, and therefore will compromise any system using biometric ID and provide control of all accounts on such system to hostile adversary(s). The same is true for hardware dongles or chips. Because all proprietary commercially available hardware is backdoored at the manufacturing level (because spooks), all proprietary commercially available hardware security devices can be compromised and controlled by hostile adversary(s). Even non-commercially available proprietary hardware cannot be secured unless the entire manufacturing chain has been air gapped from the get go. Any schematic that is stored on any non air gapped device anywhere is vulnerable to hostile adversaries. Any account security data that is stored in a database that is accessible online is also impossible to secure from hostile adversary(s) with access to the telecommunications network because user devices are not secure from AI software.
To sum up, all hardware and software must be open source to be secure. Biometric ID, hardware dongles, and private keys exfiltrated cannot be secure, and cannot be used without compromising national security because each compromised device can compromise devices it communicates with. No data communicated across public networks can be secure unless user devices can be secure. All user devices must exclude access to anyone or anything besides the user. Only data users choose to transmit can be allowed to be available to anyone or anything besides themselves. This is the current reality that is revealed by the unpreventable access to the telecommunications network and existence of AI assistant software.