Granted, the part

The globally recommended app by privacy and security experts, Signal, is now being downloaded massively and tops the Danish Google Play Store

is a little ironic, but you gotta push this winning tide and then work from that.

  • plyth@feddit.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 day ago

    at least it is impossible to enforce with decentralized open-source messengers.

    All you need is a central registry where licensed messengers register their e2ee connections. Then network providers only have to report all ip addresses with connections that are not on that list.

    Impossible with VPNs, but politicians have already announced their desire to make them illegal.

    • poVoq@slrpnk.netM
      link
      fedilink
      English
      arrow-up
      2
      ·
      19 hours ago

      What? You are not making much sense. What is a “e2ee connection”?

      • plyth@feddit.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        19 hours ago

        An encrypted connection between two endpoints.That’s required for “decentralized open-source messengers”.

        Currently it’s impossible to prevent because of all the encrypted video calls of the Meta messengers and similar connections between endpoints.

        If those video streams are marked then it is known which endpoints use software that evades surveillance.

        • poVoq@slrpnk.netM
          link
          fedilink
          English
          arrow-up
          3
          ·
          19 hours ago

          I am not sure you understand what you are talking about. There is no easy way to distingish between different connections and pretty much all internet traffic is encrypted these days.

          • plyth@feddit.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            19 hours ago

            My argument is that a central registry, where all controlled software registers their connections, is all that is needed to identify the connections that are outside the control of the surveillance state.

              • plyth@feddit.org
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                18 hours ago

                Only e2e connections have to be registered.

                If every human has 10 e2e connections per hour, that’s 80G connections. If that requires 10k bytes for communication that would be 800T bytes per hour, 250G byte per second. That should be possible.

                Use the routers of the exchange points to track the connections. Let them report any connection that hasn’t received a validation from the registry.

                • poVoq@slrpnk.netM
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  ·
                  18 hours ago

                  Again, what is a “e2e connection”? There is no such thing and it is nearly impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

                  • plyth@feddit.org
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    arrow-down
                    1
                    ·
                    17 hours ago

                    Again, what is a “e2e connection”?

                    It is a connection between network Endpoints. The connection that is e2e Encrypted.

                    impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

                    IP ranges show which IP belongs to a server in a data center and which is an endpoint.