this post was submitted on 13 Jun 2024
56 points (75.9% liked)

Asklemmy

43777 readers
2316 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
 

Every search you make, email you send, text message, voice chat, location, and most likely the conversations you have in your own home are monitored and stored in a database for whoever knows how long (probably forever). When I hear land of the free, I immediately think bullshit. We are slowly losing our freedoms, what can we do to prevent this? I mean, when Edward Snowden dropped the leaks, people protested, but barely anything changed. What can we do? This post not only applies to Americans, your own government in another country may possibly does the same thing. Feel free to comment!

you are viewing a single comment's thread
view the rest of the comments
[–] Max_P@lemmy.max-p.me 9 points 4 months ago* (last edited 4 months ago) (1 children)

My feeling about that is that I should assume anyone who could monitor my traffic should be assumed to do so and I therefore should apply reasonable defenses regardless. Even if the government doesn't do it, hackers around the world will. That means the moment it leaves my router, it's assumed compromised.

Same for smart Internet connected devices. The government might be listening, but I certainly don't trust the manufacturer to not be listening for the purpose of advertising either.

How many stories broke out recently of ISP router having been compromised by foreign hackers for years? Yeah. The Internet is the wild west.

In point of fact, the alphabet agencies have for years now adopted a “capture now/read later” approach to encrypted traffic they consider to be suspect. “Later” is code for “after we’ve got cost-effective and scalable quantum compute that can break traditional encryption”. So if you haven’t been keeping up with bleeding-edge quantum-resistant cryptography when generating and using your own keys, you’re probably going to have your traffic read by an NSA analyst (or more likely, some sort of NN-based “terrorist detector”) at some point.