• SteleTrovilo@beehaw.org
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    As worded, this would apply to every Turing-complete system that exists, right? Or is it meant to target specific pieces of software - like GPG and Signal and Protonmail and TOR - where the governments don’t have a backdoor?

  • onlooker@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    Well, how delightfully vague. A “sophisticated, encrypted communication device” could be just about anything that connects to the internet.

    • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
      link
      fedilink
      arrow-up
      4
      arrow-down
      2
      ·
      1 year ago

      That’s how totalitarian regimes operate, they create vague laws that can then be applied to prosecute whomever is deemed to be a threat to the regime.

  • Marius@mastodonapp.uk
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    @yogthos if my digital devices, whether online or offline, cannot be encrypted anymore, then I have no use for them. I will get rid of them and won’t buy the next models anymore.

    • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      1 year ago

      I think they’d love to outlaw general purpose computing. We can already see a preview of what that looks like with how mobile devices work. You don’t have root privileges on the device, and it’s explicitly locked from you. You are only allowed to install software from the official sources, and this software can be wiped remotely from your device if its deemed inappropriate. This is the future of computing that’s being envisioned. The computer just becomes another appliance as opposed to a general purpose computing machine that you yourself can program.

        • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          1 year ago

          The part I’m worried about is how long it’s going to be possible to buy hardware that’s not locked down. It’s almost impossible to buy a phone that doesn’t need to be hacked to get root nowadays.

          • Marius@mastodonapp.uk
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            @yogthos I think we will always have that option. Probably you will only not be able to go for the high end devices while seeking full access to your own device, your own property.

            PS: No wonder why Linux phones are getting a lot of momentum lately.

  • skymtf@pricefield.org
    link
    fedilink
    arrow-up
    2
    ·
    11 months ago

    Is it only a matter of time until they scan packets with DPS to find encryption and send the police hit squad to your house

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Sure and then you use a large language model to generate innocuous messages that have sternographic encoding of your real message. And then they scan for sternography. And then the identify people who talk weirdly. The rabbits hole never ends.

      Making thought and math illegal is just crazy. You’re sabotaging your own people.