pgp pigeon mail
Privacy
Welcome! This is a community for all those who are interested in protecting their privacy.
Rules
PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!
- Be civil and no prejudice
- Don't promote big-tech software
- No apathy and defeatism for privacy (i.e. "They already have my data, why bother?")
- No reposting of news that was already posted
- No crypto, blockchain, NFTs
- No Xitter links (if absolutely necessary, use xcancel)
Related communities:
Some of these are only vaguely related, but great communities.
- !opensource@programming.dev
- !selfhosting@slrpnk.net / !selfhosted@lemmy.world
- !piracy@lemmy.dbzer0.com
- !drm@lemmy.dbzer0.com
many people in the comments say that they’d keep using the banned apps, which is a fair thing to say since we said that they’re banned not blocked.
however, i would a assume that banned encryption eventually means blocked encryption. as is the case in russia where matrix and simpleX are blocked too https://merlinux.eu/press/2025-05-14-russia-deltachat.pdf
now, blocked servers can be accessed via vpn as many people pointed out, but a government that really wants to crack down on encryption would use deep packet inspection like the uae. this allows detection and blocking of vpns too, as long as they’re well known enough, just like with the encrypted chat servers. so, vanilla wireguard may be blocked, but the latest obfuscated wireguard mod may not.
with all that in mind, encrypted communication would probably be a constant cat and mouse game, unless everyone built their own very tiny encrypted communication. if the variety was large enough, it would probably be too resource intensive to block it all, but it would also be very resource intensive for everyone trying communicate. also, not everyone is a programmer, capable of creating their own encrypted messaging.
i’d be really curious what people would do unter the described, very restricted circumstances that partially exist in some places of the world. i don’t really have an answer yet.
Saddle that sentence and ride it to work as it runs on and on.
ML based semantic obfuscation. Without going too much into details, the idea is to use a seq2seq+VQ-VAE model to create embeddings, then modify those embeddings via a key (ideally in a way that preserves the latent distribution of the training set). The model is trained with cycle consistency, i.e. minimising the difference between the input embedding and output embedding. By knowing the key, the embedding from the encoded output can be converted back to the embedding for the original input, and the encoded text appears as clear-text as long as you stay within the distribution.
Signal with proxy with all my contacts, no other way