Have strong opinions, but I welcome any civil fact-based discussion.
Alt account: /u/BrikoX@lemmy.sdf.org
If you read the blog post you would know there are 0 mentions of VPNs there. VPNs have very limited purpose, and it’s just a small tool in the arsenal of privacy.
RCS doesn’t support encryption natively. Google only has proprietary encryption for Messages app.
How about the false positives? You want your name permanently associated with child porn because someone fucked up and ruined your life? https://www.eff.org/deeplinks/2022/08/googles-scans-private-photos-led-false-accusations-child-abuse
The whole system is so flawed that it has like 20-25% success rate.
Or how about this system being adopted for anything else? Guns? Abortion? LGBT related issues? Once something gets implemented, it’s there forever and expansion is inevitable. And each subsequent government will use it for their personal agenda.
It converts YouTube links into privacy-friendly frontend.
They offer integrated aliases via Proton Pass now.
Good point, but I didn’t think of it that way just because, I saw things and read stuff that made me suspect it…
There is “speculation” spread about every single “privacy” focused service for exactly that reason. If you don’t trust them, you are not using them. I’m not saying don’t be suspicious, but also look at facts that make it unlikely of it being a honeypot.
But they did, and it worked for them before, and it’ll always work unless no one start using that service, so there’s no point in keeping servers operational… time for a rebrand. plus they’re getting paid.
Right, but there are plenty of easier services to target that provide more sensitive information. If you are a honeypot, you have to be profitable and expand your services or people will move somewhere else. That all takes time and work. Buying other services like SimpleLogin or Standard Notes and integrating their staff into your scheme would be unnecessary complication.
having it outside 14 eyes countries would be the most stupid decision the government could make.
It’s not a story. So called 5 eyes, 9 eyes and 14 eyes refers to country agreements to share intelligence and make cooperation instant instead of having to go through proper channels that take time. I’m sure there are many conspiracy theories about specific things that might not be true, but there is no dispute that these agreements exist.
Government run honeypots are usually facilitated by federal agencies, INTERPOL, or EUROPOL, and if they want to run something in a country where they are not welcome it has to be court approved. Hence, it being run in 14 eyes countries, make it easy. Switzerland on the other hand not only requires everything to be approved by their courts, but also require using their specific privacy laws when making determination, which are the strongest in the world.
You only need to look at previous known honeypots to see where they originate and what they target.
You thinking it’s a honeypot is a win for the government. All they need to do is spread some propaganda instead of actually bothering to run a service that is hard to keep alive. And if they were to run a honeypot, having it outside 14 eyes countries would be the most stupid decision the government could make.
No company executive will go to jail for you. Give any company a court signed order and they will comply. Hence, the companies that orient around privacy limit the data they retain so that when they get a court order, they have nothing to give. Email is flawed by design, so some metadata always has to be stored for it to be functional.
You are absolutely right about metadata, but as far as protests, just having encryption is enough to prevent anyone from accessing the data. Extracting metadata from 3rd party companies or extracting a phone requires a lot more resources than cops can spare.
Updated.
Some options are listed here https://www.oss.fund/categories/bounties/
It was always happening and at a large scale, it’s just there are new reporting requirements now, which leads to more nonspecialized publications to cover it more often.
Hi. Could you add a link to your Lemmy account to any other source? The website/GitHub/Mastodon/Liberapay doesn’t mention this account.
You are missing the point. You don’t have to become a subject expert to verify the information. Not all sources are the same, some are incorrect on purpose, some are incorrect due to lax standards. As a thinking human being, you can decide to trust one source over the other. But LLMs sees all the information they are trained on as 100% correct. So it can generate factually incorrect information while believing what it provided you are 100% factually correct.
Using LLMs as a shortcut to find something is like playing a Russian roulette, you might get correct information 5 out of 6 times, but that one time is guaranteed to be incorrect.
Useless. Unless you are dumb enough to trust the result without verifying it yourself. And if you do verify it, at that point you spend more time than just doing a regular search.
All platforms that don’t have public API access will require a way to relay that information, but I was talking about the difference in how the messages are relayed. Matrix bridges work fundamentally on each platform/protocol having its own room and relaying the messages through the bridged room instead of the user as XMPP does. That’s why you can relay the same messages to multiple rooms on Matrix, but can’t do the same on XMPP.
Why is JSON better than XML? It’s more modern, sure, but from technical perspective it is not objectively better right? Not something worth switching protocols for.
XML is unnecessarily complicated. By trying to cram everything into the spec, it’s cumbersome and hard to parse.
You mention XMPP has transports as opposed to Matrix bridges. I thought they give you roughly the same outcome. What’s the difference?
The goal is the same, but the way they archive that is different. For transport to work, you need an account on each platform you are using the transport on. It relays the messages through that account by mimicking the client. While bridges work by relaying the messages between rooms and not specific users.
My understanding is limited, so if you are interested, please do your own research.
It really depends on each person’s threat model. But there are a few things everyone would benefit from. Like VPN, email aliasing, password manager, 2FA/MFA. They don’t have any convenience cost and in most cases make your life easier.
If you are interested in learning more: