this post was submitted on 13 Jun 2024
56 points (75.9% liked)

Asklemmy

43777 readers
2316 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
 

Every search you make, email you send, text message, voice chat, location, and most likely the conversations you have in your own home are monitored and stored in a database for whoever knows how long (probably forever). When I hear land of the free, I immediately think bullshit. We are slowly losing our freedoms, what can we do to prevent this? I mean, when Edward Snowden dropped the leaks, people protested, but barely anything changed. What can we do? This post not only applies to Americans, your own government in another country may possibly does the same thing. Feel free to comment!

you are viewing a single comment's thread
view the rest of the comments
[–] hedgehog@ttrpg.network 0 points 4 months ago

theoretically they can

Is this a purely theoretical capability or is there actually evidence they have this capability?

it's already been proven that they can tap into anyone's phone

Listening into a conversation that you’re intentionally relaying across public infrastructure and gaining access to the phone itself are two very different things.

The use of proprietary software in literally everything

  1. Speak for yourself. And let’s be real, if you’re on Lemmy you’re 10 times more likely to be running Linux.
  2. Proprietary != closed source
  3. Do you really think that just because something is closed source means that it can’t be analyzed?

the amount of exploits the NSA has on hand

How many zero-day exploits does the NSA have? How many can be deployed remotely and without a nontrivial action by a user?

what's stopping the NSA from spying this much?

Scale, capacity, cost, number of employees

—-

I’m not saying we shouldn’t oppose government surveillance. We absolutely should. But like another commenter pointed out, I’m much more concerned with the amount of data that corporations collect and have.