this post was submitted on 20 Jun 2024
612 points (98.6% liked)

Technology

69247 readers
5165 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 76 points 10 months ago (2 children)

The real offenders (except for some stupid rookies) move to the dark web and won't touch the official apps while politicians use this power to scan for political and environmental activists, opponents and critics.

[–] [email protected] 22 points 10 months ago (1 children)

I said the same to a coworker this week. If i were to be part or manage an illegal ring like csam, id make my own protocol/app that just uses encryption. Youre already doing illegal shit, go one further so you dont get caught

[–] [email protected] 2 points 10 months ago (1 children)
[–] [email protected] 1 points 10 months ago

This guy kiddie porns.

[–] [email protected] 9 points 10 months ago (1 children)

Probably won't even need anonymizers for this! Chances are concealing usage of your own server would not be that hard on the clearnet either.

[–] [email protected] 3 points 10 months ago (1 children)

No it will be. Having your own XMPP/IRC server doesn't prevent the NSA from spying on your metadata, and that's exactly what will happen. It's just that TOR and I2P will likely see an increase in traffic

[–] [email protected] 2 points 10 months ago (1 children)

Indeed. Protecting the metadata is already a completely different task from protecting the contents. But how would this law in particular change this aspect? It concerns message contents, surveillance of metadata stays the same (aka full). I was saying this about getting back access to encrypted messaging even with a low threat model.

[–] [email protected] 2 points 10 months ago

You're right about that, I commented without thinking. Thanks