this post was submitted on 24 Aug 2024
479 points (98.4% liked)
Technology
59174 readers
2401 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Reminds me of the Anom phone. E2E encryption, but the whole thing was run by law enforcement.
https://en.m.wikipedia.org/wiki/Operation_Trojan_Shield
Well, yes.
The idea was fine, until it spread to normies which don't understand that "proprietary software" means a whole city or factory which they won't be able to study and understand in 10 years, while "free and open source software" means the same, but with a map. And that in the latter case there is at least a category of interested people who'll look for traps there, and it's built by such people, while in the former it's all commercial company's property.
And that TG desktop's sources being open doesn't mean that there's a confirmed lack of traps.
People severely underestimate the complexity of what they use. Maybe they just shouldn't, if valuing privacy.
I really think there's a niche for some "luddite machines" running Forth with an operating system a normie can grasp.
Or we are going to have something worse than most examples of anti-utopia I've read\seen.