=== ANCHOR POEM === ◀─╔════════════════════════[BOOST]══════════════════════════─────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ Remember Friends: │ ║ ║ │ │ ║ ║ │ You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys." │ ║ ║ │ │ ║ ║ │ This is not possible. │ ║ ║ │ Do not believe anyone telling you otherwise. │ ║ ║ │ │ ║ ║ │ End-to-end encryption protects us all, │ ║ ║ │ we must fight to keep it ✊🔒 │ ║ ║ │ │ ║ ║ │ #Privacy #Encryption #E2EE #RootForE2EE │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧═══════════════════════════════════════════════─────────────┴───────╝─▶ === SIMILARITY RANKED === --- #1 fediverse_boost/3948 --- ◀─╔═══════════════════════[BOOST]════════════════════════────────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ There is no such thing as a backdoor for good guys. Once you place a backdoor, you compromise the safety and privacy of all your users. A third party or bad guys will get access to it and abuse it further. The concept of a "backdoor for good guys" is fundamentally flawed and dangerous. It sets a dangerous precedent. Security and privacy should be absolute. There's no safe way to create a backdoor that can't be exploited by malicious actors. #privacy #security #infosec │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧════════════════════════════════════════════────────────────┴───────╝─▶ --- #2 fediverse/1693 --- ════════════════════════════════════════════════════─────────────────────────────── "if I work on the TTY then they can't forward my X session without my consent" - ramblings of the utterly deranged as if they couldn't just look at your unencrypted source-code as you save it to your hard drive smh ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘ --- #3 fediverse/2224 --- ═════════════════════════════════════════════════════────────────────────────────── No plan survives contact with the enemy, and any plan that everyone knows is a plan that your enemy knows. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘ --- #4 fediverse/2252 --- ══════════════════════════════════════════════════════───────────────────────────── ┌──────────────────────┐ │ CW: tech-encryption │ └──────────────────────┘ users don't want to have to think about encryption keys. they should be available for them if they need them, in like... a folder or something somewhere, but they don't need to really know that they exist. more friction like that keeps people away from being secure. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #5 fediverse/4751 --- ═══════════════════════════════════════════════════════════════──────────────────── apparently security through obscurity is out, and security through community is in, don't ask me how I know that teehee ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════───────────────────┘ --- #6 fediverse/3469 --- ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #7 fediverse_boost/3867 --- ◀─╔═══════════════════════[BOOST]════════════════════════────────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ I really hate "two factor" auth. Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit. │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧════════════════════════════════════════════────────────────┴───────╝─▶ --- #8 fediverse/624 --- ═════════════════════════════════════════════────────────────────────────────────── You know, there's no guarantee that Youtube or Gmail has to show you the EXACT SAME video or message that your friend shared with you. Or did they even share it at all? So hard to tell when they know all the communication you've ever had, because you only know each other online on their platforms, [read: US government observed platforms] [like, HTTPS] surely there's no room for someone to sneak in and edit your conversations. Surely the only way to securely communicate is to send pure PGP encrypted bytes to another target, wrapped in a TCP/IP header, with unknown intent or expression. Worst they could do then is just, y'know, block it entirely. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #9 fediverse/5961 --- ══════════════════════════════════════════════════════════════════════════───────── @user-138 maybe it's evil hackers - idk that's beyond my expertise - good luck : ) (I'd need to see the piece of technology to work on it. I'm a hardware kinda [girl, but pronounced guy]) ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #10 messages/329 --- ═══════════════════════════════════════════════════──────────────────────────────── LLM training data that's been encrypted in such a way that it preserves symantic meaning, while also allowing for secrecy and unique customization ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════───────────────────────────────┘ --- #11 messages/887 --- ═══════════════════════════════════════════════════════════════════──────────────── To defeat community, all they have to do is get you to have more fun with their people until you start spending time away from the enmeshed people who know you. Honeypot style. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #12 fediverse/664 --- ═════════════════════════════════════════════────────────────────────────────────── @user-482 [secretly installs a keylogger and doesn't tell anyone upstream but still pushes it to production] [or worse, was told to do as such and given tools to fabricate "evidence" to the contrary to everyone else on the team] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #13 fediverse/2200 --- ═════════════════════════════════════════════════════────────────────────────────── I love D&D books with lots and lots of randomized tables because you can, in a pinch, use them as code-books for encrypting text using a method that nobody will ever guess. Well, as long as you have two of them, one to give to your friend and one to keep yourself. This is a form of "symmetric encryption", where you each have a copy of the input/output tables. More secure is the private/public key style encryption, but good luck explaining that to a 14 year old. Plus you can't do it over a radio, you need a computer. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘ --- #14 fediverse/1466 --- ════════════════════════════════════════════════─────────────────────────────────── ┌──────────────────────────────────────────────────────────┐ │ CW: death-mentioned-insurance-mentioned-bricks-mentioned │ └──────────────────────────────────────────────────────────┘ my opsec is non-existent teehee does anyone want my IP? or even my address, it's not like I lock my door if (when) my poor decisions get me killed (whoops adding content warning) please throw a brick at an insurance company for me thanks ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘ --- #15 fediverse/3351 --- ═══════════════════════════════════════════════════════──────────────────────────── privacy doesn't mean anything on the internet to me because privacy on the internet doesn't mean anything to "them" gestures vaguely, maybe winks once or twice and/or presents an emphasis face ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════───────────────────────────┘ --- #16 messages/1438 --- ══════════════════════════════════════════════════════════════════════════════════─ The trick to motorcycles is: don't crash, and be loud enough so that nobody forgets you're there. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘ --- #17 fediverse/4296 --- ═══════════════════════════════════════════════════════════──────────────────────── @user-1655 why don't we just weaponize email and send json to each other that ends up parsed, interpreted, and presented on the end-user's computer using whatever client we want? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘ --- #18 messages/181 --- ══════════════════════════════════════════════───────────────────────────────────── I know you don't want to hear this, but there is a chance that there will come a time where your life depends on your ability to debug a computer without the internet. To set up an SSH server. To install Linux. To program in C. To do something else that I'm not prepared for... If StackOverflow didn't exist because network connectivity has been lost, could you remember syntax? Maybe it's a good idea to set up a local LLM that can answer basic questions about technology. Maybe it's a good idea to set up on your parents computer, just in case you have to hide out there for a couple months. Maybe it's a good idea to download wikipedia, just in case. If I need to use a mac, I'm screwed ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #19 messages/635 --- ════════════════════════════════════════════════════════════─────────────────────── Yeah, sure, signal is encrypted, but they could just put a virus on your miniature pocket tv that streams your screen into a text recognition bot which streams that text into an LLM trained to report on suspicious seditious activity. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘ --- #20 messages/747 --- ════════════════════════════════════════════════════════════════─────────────────── if you don't want to be hunted, then give "evil" it's own queer culture what's that? they don't like what you offered? they want it to be *their* kind of "evil"? fine, do it themselves and then leave us alone, jeez -.- ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ |