88
submitted 7 months ago by AprilF00lz@lemmy.ml to c/privacy@lemmy.ml

I'm thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

you are viewing a single comment's thread
view the rest of the comments
[-] possiblylinux127@lemmy.zip 3 points 7 months ago* (last edited 7 months ago)

They are very much not. Anyone who tells you this is a state influencer or someone who believed a state influencer.

[-] jet@hackertalks.com 3 points 7 months ago

Saying something has the capabilities of a honeypot, is the correct thing to do when we're assessing our threat model.

Is it a honey pot? I don't know. It's unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.

[-] possiblylinux127@lemmy.zip 5 points 7 months ago

My concern is people stay away from Signal in favor of unencrypted privacy nightmares. It happened with DDG a while back where I knew people who used Google because DDG had privacy issues. It sounds dumb but it is a true story.

[-] jet@hackertalks.com 3 points 7 months ago

Sure. I still encourage people to use signal. Most people don't have a threat model that makes the honey pot scenario a viable threat. In this thread we are talking about its downsides, which is healthy to do from time to time. Acknowledging capabilities is a good exercise.

this post was submitted on 15 Apr 2024
88 points (94.9% liked)

Privacy

32142 readers
1303 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS