ancom

joined 3 years ago
[–] ancom@lemmy.ml 33 points 3 years ago (5 children)

Clients are open source. Independent clients exists and they work. So the server must kind of do what signal claims, otherwise those devs would notice.

[–] ancom@lemmy.ml 3 points 3 years ago

can you trust it when a researcher was able to identify Tor users 100% of the time in a lab experiment and 81% of the time in real-world tests [1][2]?

I know that you are doing this conspiracy thinking on purpose to confront Dessalines about their bias, but while this is not obvious to everyone:

While it is true what you say, it is beyond meaning for the most usage of Briar. The researchers result depended on a honeypot that served a large file. Don't have contacts that act as honeypot and you're safe. When chatting with strangers, the technique discovered by that researcher might not be relevant to Briar, but I have not enough knowledge to make a claim about that.

[–] ancom@lemmy.ml 4 points 3 years ago

@KLISHDFSDF You may like to make a TL;DR that clarifies the intention of that post.

It's very confusing for anyone who didn't read Dessalines anti signal article, and even more if one doesn't know that you are questioning their conspiracy thinking.

Anyway, don't use Signal, Briar and Tor, they are shit-lib-CIA regime change tools. [meta: the last sentence is sarcastic]

[–] ancom@lemmy.ml 1 points 3 years ago (1 children)

What I'm saying is that you are at such an edge.

[–] ancom@lemmy.ml 1 points 3 years ago

You can either make e2ee easy to use and enable it by default, or you can try to make people understand what they are doing to protect them from edge cases. Conversations does the former, while not making the latter impossible.

...the "edge case" that e2ee should protect from third parties such as an admin to read the messages. A new key could create a pop up window that informs the user. If user doesn't care, there can be an option for "never show again". Having a function that says "verify key", should also be expected from an app that argues to have secure e2ee implementation.

as most people don’t really need strong e2ee anyways.

Most people don't need any. It's infosec larping what people do. And then software developers build software for LARPing.

[–] ancom@lemmy.ml 2 points 3 years ago (3 children)

That’s true, but how do opposing ideologies deal with it?

There are many means. Some of them are: Practicing mutual aid. Building spaces that try to be non-discriminant. Listing to marginalized people and learn to one can be supportive to their cause. Learning about structural oppression and how oneself takes part in upholding such and how one can undo that. Building mutual respectful relationships. But of course it also means to confront those who are discriminating especially if they aim to uphold/organize society in a way that brings huge risks for those they discriminate.

What remains true: humans aren't prefect. And we easily reproduce behavior that we actually wish to abolish. Machismo in antifa structures is a good example of such.

and an extreme is never good by definition.

Do you notice that by your own definition, this statement is "never good" and so it is contradicting itself, because you present it as an extreme that does not allow other options. This means you don't argue based on logic but based on ideology, and I would argue an ideology that is by your definition extreme, because it is strongly opposing those ideas you call to be extreme.

[–] ancom@lemmy.ml 2 points 3 years ago* (last edited 3 years ago) (1 children)

Conspiracy theories exist because the government’s version is a shameless lie attempting to cover its involvement in risky affairs.

If you're giving an example of something that is one among several reasons why conspiracy theories exists, I agree with you. If not I strongly disagree with you.

Governments are justifying their existence with conspiracy theories. Governments use conspiracy theories to distract and create fear, or to justify an action. Common people create/follow conspiracy theories to find stability and feel superior. Common people create/follow conspiracy theories for personal gains. Common people create/follow conspiracy theories because they present an simple answer. ...and many more reasons.

[–] ancom@lemmy.ml 1 points 3 years ago (2 children)

I think in Conversations it switches from a green to a yellow sign).

There is no button called: verify key or something in conversations. It is a hidden setting. Do you know how to verify a contact without using the qr code? It's a hidden setting and most users won't know it. Neither does it give you info that you can verify keys by scanning qr code. How should a user know? Not. So they stick to default settings, and the default setting is, that an admin can inject keys anytime they want, without user noticing.

As for file sending, these are (usually still transport encrypted)

I've mentioned Gajim, not any client. Gajim uses jingle without transport encryption.

[–] ancom@lemmy.ml 1 points 3 years ago (5 children)

So your issue isn't about extremism, but with hating others just for being others? The ideology of facism is very much about that. Anarchists and anti-authoritarian communism are opposed to such, and actually wish that different concepts how to life can peacefully coexist.

The concept of extremism is strongly tight to a status quo bias, where you define a status quo as norm, and everyone who's strongly opposing it as extremists. If that is your definition I am an extremist.

[–] ancom@lemmy.ml 1 points 3 years ago (8 children)

This sounds like an extreme strong political believe you hold that does not allow any nuance.

I'm an anarchist, and there are many communists I get well along with, except for the authoritarian branch of communism.

[–] ancom@lemmy.ml 2 points 3 years ago (4 children)

default setting is that admins can easily inject their own key without user noticing it.

additional to that: gajim sends files over jingle without encryption in e2ee chats dino does not offer reliable e2ee for group chat. it is difficult to verify keys in conversations because these settings are hidden afaik.

view more: next ›