chobeat@lemmy.ml to Technology@lemmy.worldEnglish · 2 months agoPlatforms Systematically Removed a User Because He Made "Most Wanted CEO" Playing Cardswww.eff.orgexternal-linkmessage-square86fedilinkarrow-up1681arrow-down17cross-posted to: technology@beehaw.org
arrow-up1674arrow-down1external-linkPlatforms Systematically Removed a User Because He Made "Most Wanted CEO" Playing Cardswww.eff.orgchobeat@lemmy.ml to Technology@lemmy.worldEnglish · 2 months agomessage-square86fedilinkcross-posted to: technology@beehaw.org
minus-squareRivalarrival@lemmy.todaylinkfedilinkEnglisharrow-up18arrow-down1·2 months ago Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else’s private property? Yes. End-to-end encryption solves that.
minus-squareTheEntity@lemmy.worldlinkfedilinkEnglisharrow-up9·2 months agoNot even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it’s extremely common with HTTP these days.
Yes. End-to-end encryption solves that.
Not even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it’s extremely common with HTTP these days.