this post was submitted on 02 Sep 2024
26 points (90.6% liked)
Privacy
32004 readers
1152 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Regarding privacy, PGP is far better than out-of-the-shelf IM-embedded encryption, if used correctly. Alice uses Bob's public key to send him a message, and he uses his private key to read it. He uses Alice's public key to send her a message, and she uses her private key to read it. No one can eavesdrop, neither governments, nor corporations, nor crackers, no one except for Alice and Bob. I don't get why someone would complain about "usability", for me, it's perfectly usable. Commercially available "E2EEs" (even Telegram's) aren't trustworthy, as the company can easily embed a third-party public key (owned by themselves) so they can read the supposedly "end-to-end encrypted" messages, like a "master key" for anyone's mailboxes, just like PGP itself has the possibility to encipher the message to multiple recipients (e.g. if Alice needs to send a message to both Bob and Charlie, she uses both Bob's and Charlie's public keys; Bob can use his own private key (he won't need Charlie's private key) to read, while Charlie can use his own private key to do the same).