In order to monitor encrypted communication, investigators will in future, according to the Senate draft and the Änderungen der Abgeordneten, not only be allowed to hack IT systems but also to secretly enter suspects’ apartments.

If remote installation of the spyware is technically not possible, paragraph 26 explicitly allows investigators to “secretly enter and search premises” in order to gain access to IT systems. In fact, Berlin is thus legalizing – as Mecklenburg-Western Pomerania did before – state intrusion into private apartments in order to physically install Trojans, for example via USB stick.

  • besselj@lemmy.ca
    link
    fedilink
    English
    arrow-up
    11
    ·
    3 days ago

    Usbguard, locked bios, and disallowing booting from USB. Good luck to them I guess.

    • FauxLiving@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      2 days ago

      Locked bios doesn’t mean anything if they have physical access to your PC.

      They can reset the bios with a jumper, replace your bootloader, forensically image your hard drives and wait for you to boot and unlock your drives so they can grab the keys from memory.

      A second trip could install a rootkit/malware because they know your encryption keys.

      • Dasus@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Not that I even remotely believe the “nothing to hide nothing to fear” rhetoric, but given the depth of your assumptions, why would the police bother doing all that to a person they don’t have strong suspicions of? Because doing all that takes time.

        It’s not that they wouldn’t want to supervise literally everyone for no reason at all, but unless you’re running a drug market from your pc or are a pathetic pedophile with cp, I find it kinda hard to believe the cops would bother.

        (And I’m an actual professional criminal, but in another country.)