• Ulrich
          link
          fedilink
          English
          -420 days ago

          Or it’s just a perfectly normal thing that billions of people do every day?

          • MynameisAllen
            link
            fedilink
            English
            119 days ago

            Except that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow

                • @Broken@lemmy.ml
                  link
                  fedilink
                  English
                  016 days ago

                  Not “you” necessarily, “one”.

                  I bring it up because you mentioned company MDM blocking signal. The fact that company MDM is active indicates its a company device (if it’s not that’s an entirely different conversation).

                  So why would one expect privacy on a device they don’t own?

                  • MynameisAllen
                    link
                    fedilink
                    English
                    016 days ago

                    Well more I’m pointing to the idea that you may be trying to whistleblow on said company and this may provide a more succinct way to do so

        • Phoenixz
          link
          fedilink
          English
          119 days ago

          Then you’re a terrorist if you use the internet, period

          Nearly all internet traffic if encrypted, and for plain browser traffic it’s probably in the 95+%

          You access your bank? Terrorist! Email? Terrorist! Lemmy? Terrorist!

        • Ulrich
          link
          fedilink
          English
          019 days ago

          Then you’re also a terrorist if you use The Guardian 🤷‍♂️

          • @Diurnambule@jlai.lu
            link
            fedilink
            English
            0
            edit-2
            19 days ago

            I dont’ know, do you have sources about this ? Or are you imagining thing and deciding it is true ?

            • Ulrich
              link
              fedilink
              English
              019 days ago

              Sources for what, exactly? What is “fantasming”? The title of the article you posted is “Criminalization of encryption”. The Guardian is using encryption to send messages, so why would they be exempt? In fact, why would any internet use at all not be criminalized? It’s all encrypted.

              • @Diurnambule@jlai.lu
                link
                fedilink
                English
                1
                edit-2
                19 days ago

                So you read the title and you know everything. There is a liste of what they are accusing and their is no mention of internet

                The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior6:

                – the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;

                – using Internet privacy tools such as VPN, Tor or Tails7 ;

                – protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;

                – encrypting digital media;

                – organizing and participating in digital hygiene training sessions;

                – simple possession of technical documentation.

                But continue to invent reality. What are fact if not debatable point of view ? That the end for me. Have a great day.