56
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 13 Jun 2024
56 points (75.9% liked)
Asklemmy
43859 readers
1716 users here now
A loosely moderated place to ask open-ended questions
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
My feeling about that is that I should assume anyone who could monitor my traffic should be assumed to do so and I therefore should apply reasonable defenses regardless. Even if the government doesn't do it, hackers around the world will. That means the moment it leaves my router, it's assumed compromised.
Same for smart Internet connected devices. The government might be listening, but I certainly don't trust the manufacturer to not be listening for the purpose of advertising either.
How many stories broke out recently of ISP router having been compromised by foreign hackers for years? Yeah. The Internet is the wild west.
In point of fact, the alphabet agencies have for years now adopted a “capture now/read later” approach to encrypted traffic they consider to be suspect. “Later” is code for “after we’ve got cost-effective and scalable quantum compute that can break traditional encryption”. So if you haven’t been keeping up with bleeding-edge quantum-resistant cryptography when generating and using your own keys, you’re probably going to have your traffic read by an NSA analyst (or more likely, some sort of NN-based “terrorist detector”) at some point.