On December 14, James Harr, the owner of an online store called ComradeWorkwear, announced on social media that he planned to sell a deck of “Most Wanted CEO” playing cards, satirizing the infamous “Most-wanted Iraqi playing cards” introduced by the U.S. Defense Intelligence Agency in 2003. Per the...
Protocols not platforms are the future.
Sadly look at email. Technically you can host it yourself but if you’re not one of the 15 or so big providers, good luck not being marked as spam before you even do anything.
The real problem is with the oligarchy controlling everything, service or protocol. This is why Threads was/is dangerous.
And they’ve been systematically shutting down anonymous email services.
Load up Brave with a tor connection, and try to sign up for anonymous email. When they can’t track you reliably, even the “anonymous” services require a confirmation email or phone number.
Man I don’t want a future where we doxx ourselves to just be on a PC. Its insane that parents think real ID for gaming is a good idea. Linux might be the only way to escape any of this in the near future.
They pretend it’s to protect us from illegal activity, but it’s really to protect them from whistleblowers.
That is definitely a good point.
That’s literally the same point I was making, that your protocol can be blocked when they’ve decided they don’t like it.
Theres always tor
https://lemmy.world/comment/14473226
Ugh, but even so popularising the protocol would make it prohibitively expensive to increase the odds of interacting with threat actors. Its never 100% but its not worse.
Somewhat unfair judgement against emails IMO, especially cause it’s the “trust list” that’s in the control of a few, with no open manner to add more people to the trust list. The protocol isn’t at fault for failing to prevent problems; it’s the ability for corporations to gain significant market share without control, before they are then allowed to put barriers down to disallow or discourage interaction between those in and out, forcing those within to stay in, while those outside to give up on others in order to gain usability.
That was my point too, I guess I wasn’t clear enough so thanks for elaborating. The protocol isn’t at fault, but something being a protocol (and not just a proprietary service) isn’t enough if the vast majority of the market share is being held by a few corporations.
Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else’s private property? Some private servers owned by who knows who on the way between that we have no idea whether they’re inspecting every packet that comes through or not.
Because that’s the bigger issue, and I’m not even sure it’s one we can solve, because it’s pretty important to how the internet functions.
A protocol still has to be supported and passed through private corporations walled gardens.
Who else remembers Comcast illegally using Sandvine to throttle bittorrent traffic specifically? Pepperidge Farm 'members.
https://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/
Yes. End-to-end encryption solves that.
Not even necessarily end-to-end, just encryption. And possibly encapsulation within an already allowed protocol, like it’s extremely common with HTTP these days.
That’s what integrity checks are for, so that no one along the path can edit what you say before it actually gets published.
That’s rather missing the point, an integrity check doesn’t solve the fact that to communicate with anyone, you have to do it through giant corporations pipes.
An integrity check doesn’t help when an ISP have straight blocked your protocols traffic, like Comcast previously did with bittorrent.
Can we stop sucking down the preachings of an idiot like Jack Dorsey? We don’t actually have net neutrality, so it’s totally within their current rights to just block traffic they don’t like.
Almost any protocol can be wrapped in any other protocol. You could, say, use bit torrent by encoding the packets and embedding the data in valid png files, then transporting them over http. As long as both sides understand the wrapping it’ll work just fine.
I’ve even seen http tunneled over DNS queries in order to completely bypass firewalls.
Could always use a vpn or tor
https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network
VPN’s also by definition still use the same corporate pipes as anything else.
Nothing in this world is ever 100% complete, but decentralization and protocols are extremely good combat measures. It is possible to poke holes in almost anything. But that does not mean it’s not worth trying.
Woosh. We’re decentralizing everything except the hardware and everyone’s like bUt iTs dEcEnTrALiZeD!
Meshtastic and reticulium.