chobeat@lemmy.ml to Technology@lemmy.worldEnglish · 6 days agoPlatforms Systematically Removed a User Because He Made "Most Wanted CEO" Playing Cardswww.eff.orgexternal-linkmessage-square86fedilinkarrow-up1678arrow-down17cross-posted to: technology@beehaw.org
arrow-up1671arrow-down1external-linkPlatforms Systematically Removed a User Because He Made "Most Wanted CEO" Playing Cardswww.eff.orgchobeat@lemmy.ml to Technology@lemmy.worldEnglish · 6 days agomessage-square86fedilinkcross-posted to: technology@beehaw.org
minus-squareRivalarrival@lemmy.todaylinkfedilinkEnglisharrow-up18arrow-down1·6 days ago Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else’s private property? Yes. End-to-end encryption solves that.
minus-squareTheEntity@lemmy.worldlinkfedilinkEnglisharrow-up9·6 days agoNot even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it’s extremely common with HTTP these days.
Yes. End-to-end encryption solves that.
Not even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it’s extremely common with HTTP these days.