• unknown1234_5@kbin.earth
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    There is no ‘lawful access’ without a warrant or my permission. there aren’t laws saying padlocks need to support a government master key, and encryption is just a digital lock.

    • Octagon9561@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      That’s literally what TSA approved locks are… Of course the master keys are freely available to everyone.

      • unknown1234_5@kbin.earth
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        Bolt cutters are not a key, they are a method of bypassing the lock. they still need a warrant to do that, which is the point.

        • yeehaw@lemmy.ca
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 month ago

          The laws don’t exist though because they’re so easily circumvented. If you AES256 encrypt something today, there’s an extremely lonely chance they can’t crack it. For years.

          With a padlock they can just pull out the cutters and they’re done.

          I’m just referring to your point on why there are no laws against padlocks in this context.

          • unknown1234_5@kbin.earth
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            fair enough, padlock was the wrong type of lock for the analogy. how about a vault door? sure that may not be as common, but you don’t have to support a government master key for those either.

            • BorgDrone@lemmy.one
              link
              fedilink
              arrow-up
              0
              ·
              1 month ago

              Same thing goes for vaults, or all physical locks. It may take a little longer than a padlock but nothing comparable to the amount of time it would take to brute force good encryption. We’re talking maybe a couple of hours or days for a vault vs. millions of years.

        • prole@lemmy.blahaj.zone
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 month ago

          they still need a warrant to do that

          Lol…

          In fascism, if you have the biggest gun, you do what you want. And Trump has the biggest “gun”

            • prole@lemmy.blahaj.zone
              link
              fedilink
              arrow-up
              0
              ·
              1 month ago

              What do you think the line is? When will it cross over and become acceptable to call it “fascism”? Because we’ve embodied Eco’s 14 features of Ur-Fascism for like 20 years. We now have a de facto dictator who is using that framework to do explicitly fascist things… Where is the line?

  • adarza@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    any ‘lawful’ access that’s baked-in will also be used and exploited ‘unlawfully’.

  • sibachian@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    fbi want direct access to encrypted data while simultaneously also all data to be encrypted in order to be protected from china?

    do explain how this is all going to work because it’s extremely confusing.

    • prole@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 month ago

      The explanation is that they will just use this shit to target whomever they please regardless of reason. This is how fascism works.

      It is meant to be confusing. Stop trying to rationalize it, you’re wasting energy.

  • endofline@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    For some reason I’m feeling so Amish… Seems like they were so right with technology risks :-)

  • NutWrench@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    It’s not my responsibility to make the FBI’s job (or any cop’s job) easier.

    Also, folks should be using 3rd party open-source encryption, like VeraCrypt and a password manager that encrypts the database, like Keepass. Don’t ever expect governments and corporations to respect your privacy.