this post was submitted on 14 Jan 2025
513 points (98.9% liked)

Technology

60469 readers
4109 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 230 points 21 hours ago (5 children)

Really highlights the fact that any free speech and naive western sense of freedom in these walled garden is just a button press away from being taken away and that there are no rules or standards. Whenever the owners or their friends feel even slightly displeased, annoyed or god forbid afraid the masks go off and the hammer falls.

[–] [email protected] 19 points 13 hours ago

They've been getting away with their class-war for so long any deviation from norms is alarming. Usually we just talk about black vs white, right vs left, etc.

[–] [email protected] 19 points 16 hours ago

That is a fair point. I've said it to numerous people talking about this subject: Americans are the most propaganda inundated people on the planet. There's some quote about about how in China people know to not believe in the gov propaganda and here it's just called the news lmao

[–] [email protected] 100 points 21 hours ago (2 children)

Protocols not platforms are the future.

[–] [email protected] 101 points 20 hours ago (3 children)

Sadly look at email. Technically you can host it yourself but if you're not one of the 15 or so big providers, good luck not being marked as spam before you even do anything.

The real problem is with the oligarchy controlling everything, service or protocol. This is why Threads was/is dangerous.

[–] [email protected] 3 points 1 hour ago

And they’ve been systematically shutting down anonymous email services.

Load up Brave with a tor connection, and try to sign up for anonymous email. When they can’t track you reliably, even the “anonymous” services require a confirmation email or phone number.

[–] [email protected] 30 points 20 hours ago (1 children)

That is definitely a good point.

[–] [email protected] 10 points 20 hours ago (1 children)

That's literally the same point I was making, that your protocol can be blocked when they've decided they don't like it.

[–] [email protected] 5 points 20 hours ago (1 children)
[–] [email protected] 4 points 19 hours ago* (last edited 19 hours ago) (1 children)
[–] [email protected] 3 points 18 hours ago

Ugh, but even so popularising the protocol would make it prohibitively expensive to increase the odds of interacting with threat actors. Its never 100% but its not worse.

[–] [email protected] 15 points 19 hours ago (1 children)

Somewhat unfair judgement against emails IMO, especially cause it’s the “trust list” that’s in the control of a few, with no open manner to add more people to the trust list. The protocol isn’t at fault for failing to prevent problems; it’s the ability for corporations to gain significant market share without control, before they are then allowed to put barriers down to disallow or discourage interaction between those in and out, forcing those within to stay in, while those outside to give up on others in order to gain usability.

[–] [email protected] 9 points 16 hours ago

That was my point too, I guess I wasn't clear enough so thanks for elaborating. The protocol isn't at fault, but something being a protocol (and not just a proprietary service) isn't enough if the vast majority of the market share is being held by a few corporations.

[–] [email protected] 9 points 20 hours ago* (last edited 20 hours ago) (2 children)

Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else's private property? Some private servers owned by who knows who on the way between that we have no idea whether they're inspecting every packet that comes through or not.

Because that's the bigger issue, and I'm not even sure it's one we can solve, because it's pretty important to how the internet functions.

A protocol still has to be supported and passed through private corporations walled gardens.

Who else remembers Comcast illegally using Sandvine to throttle bittorrent traffic specifically? Pepperidge Farm 'members.

https://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/

[–] [email protected] 12 points 19 hours ago (1 children)

Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else's private property?

Yes. End-to-end encryption solves that.

[–] [email protected] 5 points 16 hours ago

Not even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it's extremely common with HTTP these days.

[–] [email protected] 4 points 20 hours ago (1 children)

That's what integrity checks are for, so that no one along the path can edit what you say before it actually gets published.

[–] [email protected] 7 points 20 hours ago* (last edited 20 hours ago) (2 children)

That's rather missing the point, an integrity check doesn't solve the fact that to communicate with anyone, you have to do it through giant corporations pipes.

An integrity check doesn't help when an ISP have straight blocked your protocols traffic, like Comcast previously did with bittorrent.

Can we stop sucking down the preachings of an idiot like Jack Dorsey? We don't actually have net neutrality, so it's totally within their current rights to just block traffic they don't like.

[–] [email protected] 11 points 17 hours ago

Almost any protocol can be wrapped in any other protocol. You could, say, use bit torrent by encoding the packets and embedding the data in valid png files, then transporting them over http. As long as both sides understand the wrapping it'll work just fine.

I've even seen http tunneled over DNS queries in order to completely bypass firewalls.

[–] [email protected] 1 points 20 hours ago (1 children)

Could always use a vpn or tor

[–] [email protected] 6 points 19 hours ago* (last edited 19 hours ago) (1 children)

https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network

Given the number of servers run by KAX17 the calculated probability of a Tor user connecting to the Tor network through one of KAX17’s servers was 16%, there was a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.

This would give the threat actor ample opportunity to perform a Sybil attack. A Sybil attack is a type of attack on a computer network service where an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. This could lead to the deanonymization of Tor users and/or onion services.

Given the cost and effort put into this and the fact that actors performing attacks in non-exit positions are considered more advanced adversaries because these attacks require a higher sophistication level and are less trivial to pull off, it is highly likely this is the work of a high-level (state-sponsored?) threat actor. As for who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.

A spokesperson for the Tor Project confirmed Nusenu’s latest findings and said it had also removed a batch of KAX17 malicious relays.

“Once we got contacted, we looked through all the relays in the network and identified several hundred relays that are very likely belonging to the same group and removed them on November 8.”

VPN's also by definition still use the same corporate pipes as anything else.

[–] [email protected] 8 points 19 hours ago (1 children)

Nothing in this world is ever 100% complete, but decentralization and protocols are extremely good combat measures. It is possible to poke holes in almost anything. But that does not mean it's not worth trying.

[–] [email protected] 3 points 19 hours ago* (last edited 19 hours ago) (1 children)

Woosh. We're decentralizing everything except the hardware and everyone's like bUt iTs dEcEnTrALiZeD!

[–] [email protected] 5 points 19 hours ago (1 children)
[–] [email protected] 3 points 19 hours ago (1 children)

Now that's an answer I can get behind.

[–] [email protected] 2 points 19 hours ago

I love the idea, but it's definitely nowhere near ready yet for prime time. And the data speeds are incredibly slow. Using it definitely is possible, but it would be absolutely nothing like the internet we are currently used to.

[–] timbuck2themoon 3 points 13 hours ago

Except freedom of speech only applies to the government. You can't yell from your neighbor's front lawn either if they don't want you to.

That said, the fact police were sent is BS.

[–] [email protected] 4 points 21 hours ago (2 children)

It seems like this is not a case of "no rules or standards". These platforms do have rules and standards. The article mentions them, in fact.

[–] [email protected] 14 points 21 hours ago (1 children)

.. and then goes on to point out how they are arbitrarily applied.

[–] [email protected] 3 points 20 hours ago
[–] [email protected] 5 points 20 hours ago (1 children)

Do you happen to work in HR? You'd fit right in considering you defend arbitrarily applied rules at the behest of management.

[–] [email protected] 3 points 18 hours ago

Ha! That's a good one.