=== ANCHOR POEM ===
◀─[BOOST]
  
  Remember Friends:                                                           
                                                                              
  You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys."   
                                                                              
  This is not possible.                                                       
  Do not believe anyone telling you otherwise.                                
                                                                              
  End-to-end encryption protects us all,                                      
  we must fight to keep it ✊🔒                                                 
                                                                              
  #Privacy #Encryption #E2EE #RootForE2EE                                     
  
                                                            
 similar                        chronological                        different 
─▶

=== SIMILARITY RANKED ===

--- #1 fediverse_boost/3948 ---
◀─[BOOST]
  
  There is no such thing as a backdoor for good guys. Once you place a backdoor, you compromise the safety and privacy of all your users. A third party or bad guys will get access to it and abuse it further. The concept of a "backdoor for good guys" is fundamentally flawed and dangerous. It sets a dangerous precedent. Security and privacy should be absolute. There's no safe way to create a backdoor that can't be exploited by malicious actors. #privacy #security #infosec  
  
                                                            
 similar                        chronological                        different 
─▶

--- #2 fediverse/1693 ---
════════════════════════════════════════════════════───────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #3 fediverse/2224 ---
═════════════════════════════════════════════════════──────────────────────────────
 No plan survives contact with the enemy, and any plan that everyone knows is a
 plan that your enemy knows.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #4 fediverse/2252 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #5 fediverse/4751 ---
═══════════════════════════════════════════════════════════════────────────────────
 apparently security through obscurity is out, and security through community
 is in, don't ask me how I know that teehee
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════───────────────────┘

--- #6 fediverse/3469 ---
════════════════════════════════════════════════════════───────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #7 fediverse_boost/3867 ---
◀─[BOOST]
  
  I really hate "two factor" auth.  Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit.  
  
                                                            
 similar                        chronological                        different 
─▶

--- #8 fediverse/624 ---
═════════════════════════════════════════════──────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #9 fediverse/5961 ---
══════════════════════════════════════════════════════════════════════════─────────
 @user-138 
 
 maybe it's evil hackers - idk that's beyond my expertise - good luck : )
 
 (I'd need to see the piece of technology to work on it. I'm a hardware kinda
 [girl, but pronounced guy])
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #10 messages/329 ---
═══════════════════════════════════════════════════────────────────────────────────
 LLM training data that's been encrypted in such a way that it preserves
 symantic meaning, while also allowing for secrecy and unique customization
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════───────────────────────────────┘

--- #11 messages/887 ---
═══════════════════════════════════════════════════════════════════────────────────
 To defeat community, all they have to do is get you to have more fun with
 their people until you start spending time away from the enmeshed people who
 know you. Honeypot style.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

--- #12 fediverse/664 ---
═════════════════════════════════════════════──────────────────────────────────────
 @user-482 
 
 [secretly installs a keylogger and doesn't tell anyone upstream but still
 pushes it to production]
 
 [or worse, was told to do as such and given tools to fabricate "evidence" to
 the contrary to everyone else on the team]
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #13 fediverse/2200 ---
═════════════════════════════════════════════════════──────────────────────────────
 I love D&D books with lots and lots of randomized tables because you can,
 in a pinch, use them as code-books for encrypting text using a method that
 nobody will ever guess. Well, as long as you have two of them, one to give to
 your friend and one to keep yourself.
 
 This is a form of "symmetric encryption", where you each have a copy of the
 input/output tables. More secure is the private/public key style encryption,
 but good luck explaining that to a 14 year old. Plus you can't do it over a
 radio, you need a computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #14 fediverse/1466 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌──────────────────────────────────────────────────────────┐
 │ CW: death-mentioned-insurance-mentioned-bricks-mentioned │
 └──────────────────────────────────────────────────────────┘


 my opsec is non-existent teehee does anyone want my IP? or even my address,
 it's not like I lock my door
 
 if (when) my poor decisions get me killed (whoops adding content warning)
 please throw a brick at an insurance company for me thanks
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #15 fediverse/3351 ---
═══════════════════════════════════════════════════════────────────────────────────
 privacy doesn't mean anything on the internet to me because privacy on the
 internet doesn't mean anything to "them"
 
 gestures vaguely, maybe winks once or twice and/or presents an emphasis face
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #16 messages/1438 ---
══════════════════════════════════════════════════════════════════════════════════─
 The trick to motorcycles is: don't crash, and be loud enough so that nobody
 forgets you're there.
                                                            similar                        chronological                        different════════════════════════════════════════════════════════════════════════════════════┘

--- #17 fediverse/4296 ---
═══════════════════════════════════════════════════════════────────────────────────
 @user-1655 
 
 why don't we just weaponize email and send json to each other that ends up
 parsed, interpreted, and presented on the end-user's computer using whatever
 client we want?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #18 messages/181 ---
══════════════════════════════════════════════─────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #19 messages/635 ---
════════════════════════════════════════════════════════════───────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #20 messages/747 ---
════════════════════════════════════════════════════════════════───────────────────
 if you don't want to be hunted, then give "evil" it's own queer culture
 
 what's that? they don't like what you offered? they want it to be *their* kind
 of "evil"?
 
 fine, do it themselves and then leave us alone, jeez -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘