Dioxy

joined 2 years ago
[–] [email protected] 5 points 2 years ago

1984 indeed..

However, private chat messages are only one component in a whole range of digital evidence that is likely to be used by police to prosecute illegal abortions in the United States. Investigators will be able to request access to many data sources, including digital health records, Google search history, text messages, and phone location data.

[–] [email protected] 1 points 2 years ago* (last edited 2 years ago)

(Also not a Lawyer) I’m not familiar with the laws in Nebraska, but they wouldn’t be able to get the messages from Meta. They would need to get on the devices, but it seemed like the people charged themselves tipped off about using Messenger to the police. The only other way to get E2EE message from a device without consent is with the use of force.

From the article:

However, campaigners note that Meta always has to comply with legal requests for data, and that the company can only change this if it stops collecting that data in the first place. In the case of Celeste and Jessica Burgess, this would have meant making end-to-end encryption (E2EE) the default in Facebook Messenger. This would have meant that police would have had to gain access to the pair’s phones directly to read their chats. (E2EE is available in Messenger but has to be toggled on manually. It’s on by default in WhatsApp.)

(…)

However, private chat messages are only one component in a whole range of digital evidence that is likely to be used by police to prosecute illegal abortions in the United States. Investigators will be able to request access to many data sources, including digital health records, Google search history, text messages, and phone location data.

[–] [email protected] 69 points 2 years ago (26 children)

What year is it

[–] [email protected] 0 points 2 years ago* (last edited 2 years ago)

We have the same issue with China, even though ‘nefarious elements’ is country agnostic, those attacking from China, from within the great firewall, still does so, and filtering the nefarious still isn’t trivial. I wouldn’t believe this would be any different, but I have no knowledge about their system, just the assumption that they have adopted a lot of the same techniques and procedures.

Edit: Changed from ‘nefarious people’ to ‘nefarious element’ as mentioned in the comment

[–] [email protected] 2 points 2 years ago

On super meth, we would've needed volunteers to TL:DR; everything. On /r/stims, the comment section tends to be quite lengthy

[–] [email protected] 2 points 2 years ago

I remember this, wasn't this a complete shitshow in the news?

[–] [email protected] 26 points 2 years ago (2 children)

We could turn to good ol’ PGP

[–] [email protected] 1 points 2 years ago (1 children)

It's weird, because that's my feeling too. It got suggested by customer support at a retailer when asking in their chat. I guess it'll work, but feels backwards. I think I'm going with a NAS solution, and running the server without RAID

[–] [email protected] 19 points 2 years ago* (last edited 2 years ago)
[–] [email protected] 1 points 2 years ago (1 children)

Thanks for the detailed response! I've looked around a bit, and a Synology DS220+ seems like a good starter. Knowing I have the ability to move comoutation to a server later on and keep using the NAS for storage makes it seem like a great setup for me

[–] [email protected] 1 points 2 years ago (3 children)

What do you think about running the OS and binaries on the SATA SSD, and storing the data on the M2's? And having the M2's in RAID1?

[–] [email protected] 1 points 2 years ago

Nostr have a adopted a system for this. It would be cool to integrate the Lightning Network into Lemmy as well!

view more: ‹ prev next ›