Oddbean new post about | logout

Notes by 7199b0ae | export

 nostr:npub165fd9p3058rzpevl8ls2t2t8waxmulfrk538lw6ymkhrcjtqaemqmfkrlq Very much so. We need onlin... 
 @f717731b I was thinking that, because #ComissionerJohansson and other proponents doesn’t care if we change fundamental principles such as the presumption of innocence, maybe they do care if we start to to accidentally leak information to the enemy? I am not sure this will work, maybe they are indirectly payed off by Putin and his cronies. In fact, it would be ironically funny if we just assume that without evidence until we have seen their entire chat history. 🤷‍♂️ 
 Let me try a #nationalsecurity argument against #ChatControl. Tell me how I am doing. 

Compared to old telephone system, packet routed data networks are notoriously insecure. Routers are routinely hacked by not only nation states, but by “hobbyists” as well. This unsafe architecture makes end to end encryption not only desired, but necessary. Data leaks occur if they can occur, among others because of unworkable IT policies or government IT infrastructure not functioning properly. Humans are focused on their tasks which is not computer security. Hence, E2E encryption for the general public is a vital fallback in a multi layer defence against data leaks.

The only place to break properly implemented E2E is on the devices, before encryption or after decryption, i.e. on the device. 

So, let’s look at the centralised collection of messages, pictures etc, detected with a lot of false positives, by the magical non-existing on-device AI that will not drain batteries in any way, this will be a high value target for criminal hackers, state sponsored hackers, etc. So instead of forcing the bad guys to spend a lot of resources on hacking individuals, they can focus on the single, very likely badly protected goldmine of intelligence which the central collection place will be.