Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

  • 1 Post
  • 34 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle




  • Sounds like a second job.

    Only a job for your PC, it just needs to shovel bytes.
    You only need to download a few popular torrents and seed them for some time. Some trackers count score for certain torrents differently, like if almost no one is seeding them anymore, or if there is a high demand. It is probably marked visibly when they do that. I don’t think it requires much work, and probably it’s fine too if you only deal with it every few days. Just keep the torrent client running and seeding, at it’ll be fine. Unless you don’t use your computer much, it’s enough if the torrent client runs while your PC is on, but under a few hours a day I’ll build up slowly.



  • A subpoena is a court order. Nothing has changed and they market that as an improvement.

    An order issued under the authority of a court, commanding a person to appear in court on a particular date, usually to give testimony in a legal case. A writ requiring someone to appear

    https://www.wordnik.com/words/subpoena

    A subpoena is a kind of court order. Specifically it is an order to a particular person to appear and testify at a particular time and place. In many but not all cases, the order also requires that person to bring specified records or documents along. That is known as a subpoena duces tecum. In some cases this is used to, order the production of documents without any accompanying testimony.

    […]

    Ther are many other court orders, such as an injunction which is generally an order not to do something. Different jurisdictions may use different terms for orders with similar effects. The exact name and exact effect of a given order will vary with the jurisdiction, which is not stated in the question at the moment. The needed process to obtain a court order will also vary. Without a jurisdiction, a more specific answer cannot be given.

    https://law.stackexchange.com/questions/59478/what-is-the-difference-between-a-subpoena-and-a-court-order

    If anything, they have even broadened the scope of documents they now accept for information disclosure requests.














  • They tell whatever they want until their claims can be validated with the source code. If we take it for granted that they use an original, unmodified version of the signal protocol programming libraries, there are still multiple questions:

    • how often do they update the version they use
    • what are they doing with the messages after local decryption (receiving), and before encryption (sending)
    • how are they storing the secret keys used for encryption, and what exactly are they doing with it in the code

    Any of these questions could reveal problems that would invalidate any security that is added by using the signal protocol. Like if they use an outdated version of the programming library that has a known vulnerability, if they analyze the messages in their plain data form, or on the UI, or the keypresses as you type them, or if they are mishandling your encryption keys by sending them or a part of them to wherever