Discussion about this post

User's avatar
EeEeEe's avatar

I found this story confusing because of the technical details. I understand that Cape tries to collect as little data on it's users as possible, they specialize in SW, etc.

However the issue with Salt Typhoon was Cisco devices that had a problematic implementation of CALEA. Most implementations of CALEA into code require the ability to have hidden taps that most network operators cannot see, because CALEA is all around how to install wiretaps. Some googling seems to indicate Cape is CALEA compliant.

So what prevents similar targeted attacks against persons of interest using the Cape network?

Expand full comment

No posts

Ready for more?