• Boring@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    3
    ·
    1 year ago

    And I’m sure you only use twofish because the NSA backdoored AES when they standardized it.

    • Joe Bidet@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      what does it have to do with Google’s business model being mass-surveillance, and/or them being caught several times collaborating with the NSA, the US army, etc.?

      I agree that the NSA backdooring stuff is a problem too… (or even a different facet of the same problem…) Yet, one doesn’t invalidate the other…

      • Boring@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I’m just saying that collaboration with or association with spooks or glowies isn’t in itself a red flag.

        Many privacy and freedom granting software is made by these people.

        Take Tor for example, made by the navy to hide information from the public and anonymously attack networks of adversaries… Yet now is the NSA’s biggest obstacle in mass surveillance.

        • Joe Bidet@lemmy.ml
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          I beg to disagree: the global interception capacities of the NSA in 2012 (as showed in the very few 2013 documents from Ed. Snowden that were made public) clearly were enough to routinely de-anonymize tor. By owning a certain percentage of the global internet traffic, you de facto own tor (can very precisely correlate what comes in and what goes out, and do that retrospectively when needed).

          and that was 10+ years aog

          Association with spooks is a red flag, for the multiple, endless ways they have been doing their shitfuckery, endangering the general public, the exceptional US citizens, and information/communication security at large… by weakening standards, by corrupting corporations to introduce (or leave open) some bugs, by infiltrating development teams, by pressuring operators to grant full access, by breaking and entering, etc…

          Anyone who doesnt see that as a problem has to be considered as part of it. Simple, basic rule.