177
all 26 comments
sorted by: hot top controversial new old
[-] Melatonin@lemmy.dbzer0.com 61 points 1 year ago* (last edited 1 year ago)

If you don't have anything to hide, then let them have your privacy. If you don't, well then, you're a suspected terrorist or child predator.

The logic is impeccable.

Edit: I WAS being sarcastic, but I guess I was getting upvotes from people who like the EU position as well.

Win-win.

[-] AdminWorker@lemmy.ca 15 points 1 year ago

I don't suppose you own curtains?

[-] dukethorion@lemmy.world 21 points 1 year ago

/missedsarcasm

[-] baggins@beehaw.org 4 points 1 year ago

I ~~think~~ hope they were being sarcastic.

Stupid bastards. I hope Apple and WhatsApp and Signal all just turn off service in the EU. Let the users eat these assholes alive when their apps stop working.

[-] HughJanus@lemmy.ml 4 points 1 year ago

I hope they just ignore them and keep the services running. But I also know that's not realistic.

Not sure how Signal is going to handle this because they literally built proxies into the app specifically to circumvent this type of legislation.

Apple and Google will put their apps but it's trivial to just install it from the Signal website on Android. Or basically anywhere else.

[-] xilliah@beehaw.org 31 points 1 year ago

Naive. There must be more practical methods to counter child abuse. For example always holding people accountable when they are known to hurt children would be a good start.

[-] GregorGizeh@lemmy.zip 32 points 1 year ago

Its just pretense. Authoritarians want that data, corps want that data, so they push that legislation.

[-] sibloure@beehaw.org 30 points 1 year ago

It's not about the children.

[-] merde@sh.itjust.works 29 points 1 year ago

Criminalization of encryption : the 8 december case

Op-ed: ʻEncryption protects our rights, privacy is not a crimeʼ

The beginning of the “8 December” trial is also the judgement of the right to privacy and encryption

In this case, protecting one’s privacy and encrypting communications is no longer merely suspect, but participates of constituting a “clandestine behavior”, a way of concealing criminal intentions. In several memos, the DGSI keeps on trying to demonstrate how the use of tools such as Signal, Tor, Proton, Silence, etc., would be evidence of a desire to hide compromising elements. And on top of this, as we denounced last June, the DGSI justifies the absence of evidence of a terrorist project by the use of encryption tools itself. According to them, if they lack of elements proving a terrorist intent, it’s because those proofs are necessarily hold back in those much-vaunted encrypted and inaccessible messages. In reaction of such absurd vicious circle, lawyers of a person charged denounced the fact that “here, the absence of evidence becomes an evidence itself“.

[-] cheese_greater@lemmy.world 23 points 1 year ago

Cute how they think that

[-] shotgun_crab@lemmy.world 22 points 1 year ago
[-] AzzyDev@beehaw.org 21 points 1 year ago

What’s stopping someone from just sending public keys or something through Signal and encrypting their messages that way? There’s no way to enforce this with such simple loopholes present. We shouldn’t be focusing on breaking privacy and instead invest in helping existing victims in ways that actually matter.

[-] princessnorah@lemmy.blahaj.zone 3 points 1 year ago

Whilst I agree with your sentiment, this isn’t how end-to-end encrypted chats work. Otherwise, it would be impossible to know the messages you’re receiving are coming from the person you think they are.

[-] AzzyDev@beehaw.org 1 points 1 year ago

I suppose you’re right, but forging that kind of thing would be difficult, also considering the PKI already in place. If someone has their own email server and they sign/encrypt their email, and host their public key on a key server somewhere, it’s highly unlikely that all three would be compromised. and even if that fails, you could just meet up with them and exchange flash drives with keys.

[-] silmarine@beehaw.org 11 points 1 year ago

How does this affect people self hosting an encrypted chat service? Would those people be at risk of a police raid or something?

[-] Infiltrated_ad8271@kbin.social 7 points 1 year ago

It only applies if there is any profit, even if it is a single ad for a single user.

[-] gjoel@lemmy.ml 3 points 1 year ago
[-] Infiltrated_ad8271@kbin.social 4 points 1 year ago

It shouldn't, they are a non-profit foundation that is funded by donations. But take it with a grain of salt.

[-] halfempty@kbin.social 9 points 1 year ago

Acts of authoritarian control always claim to be done "for the children". They don't care about children, they want control.

[-] waow@lemm.ee 3 points 1 year ago

what did you think would happen when unelected elites start appointing Commissioners for Truth?

After all, as many were keen to point out during the EU/Musk row, there’s no free speech in Europe so why should there be private speech?

[-] shiveyarbles@beehaw.org 2 points 1 year ago

We value your privacy, as long as we can see it all

this post was submitted on 13 Oct 2023
177 points (100.0% liked)

Privacy Guides

16263 readers
4 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 2 years ago
MODERATORS