Granted, the part

The globally recommended app by privacy and security experts, Signal, is now being downloaded massively and tops the Danish Google Play Store

is a little ironic, but you gotta push this winning tide and then work from that.

  • poVoq@slrpnk.netM
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    I am not sure you understand what you are talking about. There is no easy way to distingish between different connections and pretty much all internet traffic is encrypted these days.

    • plyth@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      My argument is that a central registry, where all controlled software registers their connections, is all that is needed to identify the connections that are outside the control of the surveillance state.

        • plyth@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          1 day ago

          Only e2e connections have to be registered.

          If every human has 10 e2e connections per hour, that’s 80G connections. If that requires 10k bytes for communication that would be 800T bytes per hour, 250G byte per second. That should be possible.

          Use the routers of the exchange points to track the connections. Let them report any connection that hasn’t received a validation from the registry.

          • poVoq@slrpnk.netM
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 day ago

            Again, what is a “e2e connection”? There is no such thing and it is nearly impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

            • plyth@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              1 day ago

              Again, what is a “e2e connection”?

              It is a connection between network Endpoints. The connection that is e2e Encrypted.

              impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

              IP ranges show which IP belongs to a server in a data center and which is an endpoint.

              • poVoq@slrpnk.netM
                link
                fedilink
                English
                arrow-up
                3
                ·
                1 day ago

                Yes, but how do you distinguish between two identical TLS connections? You can’t and hence you can’t figure out if the content inside is additionally e2e encrypted. So what you are suggesting just doesn’t work technically.

                • plyth@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  1 day ago

                  The registry tells me if a connection is from an app that uses encryption that I can break. Everything else is suspect, needs investigation and after an introduction time, will be forbidden. Routers can easily discard everything that is not approved by the registry.

                  • poVoq@slrpnk.netM
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    ·
                    1 day ago

                    How? You have two arbitrary computers exchanging TCP packets. There is no way to tell any difference.