this post was submitted on 02 May 2026
51 points (96.4% liked)

Slop.

846 readers
416 users here now

For posting all the anonymous reactionary bullshit that you can't post anywhere else.

Rule 1: All posts must include links to the subject matter, and no identifying information should be redacted.

Rule 2: If your source is a reactionary website, please use archive.is instead of linking directly.

Rule 3: No sectarianism.

Rule 4: TERF/SWERFs Not Welcome

Rule 5: No bigotry of any kind, including ironic bigotry.

Rule 6: Do not post fellow hexbears.

Rule 7: Do not individually target federated instances' admins or moderators.

founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/46324512

Am I crazy not to trust Chinese developed games ?

There is no question over the last 10 years the quality and production level of Chinese developed games has seem to sky rocket. Many of these games even being free to play. But honestly I haven’t played a single one. For the same reasons I refused to download TikTok.

China is a well known surveillance state. I worry downloading and playing these games especially on a PC or mobile phone would just be a huge privacy risk.

Am I being to paranoid ? Are there some regulations I’m not aware of that might protect me anyway ?

I feel like I’m missing out on some really high quality visually striking games because of it

you are viewing a single comment's thread
view the rest of the comments
[–] ChaosMaterialist@hexbear.net 4 points 10 hours ago

Is China in the room with us right now?

The US government sure is, and through expert hacking and intelligence infiltration so are the Chinese. So maybe?

Despite sanctions and public exposure, Salt Typhoon continues operating. Recorded Future documented new breaches of five additional telecom firms between December 2024 and January 2025. By August 2025, the FBI confirmed Salt Typhoon had hacked at least 200 companies across 80 countries.

And just to cement this, here's Congress saying the same thing

“They exploited the wiretapping system that our law enforcement agencies rely on under the Communications Assistance for Law Enforcement Act — known as CALEA. These systems became an open door for Chinese intelligence. Salt Typhoon allowed the Chinese operation to track millions of Americans’ locations in real time, record phone calls at will and read our text messages.”

“So how did this happen?” she continued. “Senior national security officials said the breach occurred in large part because telecommunications companies failed to implement rudimentary – rudimentary! — cybersecurity measures. Investigators found legacy equipment not updated in years, router vulnerabilities with patches available for seven years — seven years! — that were never applied, and hackers acquiring credentials through weak passwords.”

More info about the hack.

The trusted transport layer is dead. Salt Typhoon, a Chinese MSS operation active since 2019, compromised nine major U.S. telecom carriers by exploiting fundamental identity failures. One administrator credential controlled 100,000 routers. Patches available since 2018 remained unapplied for years.

The attackers accessed CALEA lawful intercept systems. They surveilled over one million Americans in real time. They intercepted calls and texts of approximately 100 senior government officials.

This is an Identity Failure Layer collapse. The breach required no sophisticated zero-days. It required one over-privileged account, absent MFA, and years of ignored patches. CISOs are misdiagnosing this as telecom-specific. It is not. Every enterprise routes sensitive traffic through compromised networks. The transport layer your organization trusts is hostile terrain. Assume unencrypted communications are intercepted. Assume metadata is logged.

The mandated backdoor built for law enforcement became the adversary's front door.

fell-for-it-again