Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

  • 1 Post
  • 870 Comments
Joined 3 years ago
cake
Cake day: June 7th, 2023

help-circle

  • the perfect showcase about the security guarantees of E2EE. It’s important, but it won’t save you if “your” phone is programmed to snitch on you. same thing applies to screen reader AIs, and whatever you grant accessibility permissions or the assistant app role.

    fun fact: on most googled phones the google assistant app is by default, without approval, set as the assistant app, and it has access to screen contents. I don’t know if it has that access all the time, maybe only when you are baited to open it by long pressing the home button or trying to turn off your phone with the power button.



  • how the hell would Microsoft implement a ban on a Minecraft server that Microsoft doesn’t host?

    if a minecraft server wants to enforce verification of the game license, the server needs to be in contact with the authentication servers of microsoft. the server operator can turn this off, but then moderation becomes much harder, as usernane based banning becomes useless, and the paywall from ban evasion disappears.

    other than that, in recent years there’s something with chat message verification that I think involves sending some of the messages to microsoft? I don’t remember exactly

    but also the minecraft client could have a built in blacklist of servers. I don’t know if it has but it’s not much work.
    a ban from the authentication server is probably easier though.









  • They aren’t encrypted, hence why I never said they were.

    you did, just with different words. without encryption and with centralized servers how would this claim of yours be the case?

    If it’s a private group they don’t know what’s happening.

    you know, trust and safety teams aren’t looking at the content with the apps when they look for harmful content. they have access to better moderation tools with access to the database, where the messages are readable to them because of the lack of end to end encryption.