Recent comments in /f/explainlikeimfive

Ground2ChairMissile t1_je7vc5r wrote

Lie to yourself all you want. I don't have to indulge your delusion.

Who is more likely to actually hurt you, the terrible Red Communist menace, or the nutjob who bought a gun with no trouble and decided he needed to rob a 7-11 for his next fix?

And which of these problems is Congress more interested in actually fixing?

0

ToxiClay t1_je7utgr wrote

> Like I said, weasel word.

Like I said, no.

>I already laid out specific threats. And why a video app isn't necessary to exploit them.

And what about all the other data China is picking up? Or the money that China is making from TikTok?

>...wait for our next scheduled mass shooting...

Oh, come on. Don't try to pivot to that fucking chestnut.

0

Moskau50 t1_je7tmnp wrote

Let's assume that the plane turns hard, like a fighter jet. The ball would seem to move in mid-air as the plane turned. if you were strapped into the plane, you'd turn with it and see the ball move sideways. If you were just standing unsupported, you would move sideways with the ball for an instant and then probably fall over.

8

ArenSteele t1_je7t2ex wrote

Well, and the fact that China used is part ownership of Zoom to snoop into all kinds of peoples meetings to identify people who supported Hong Kong democracy protests and attempt to extradite and imprison them

So they will absolutely use Tik Tok for hostile means

And yes we need to crack down on domestics data abuses as well

2

aqhgfhsypytnpaiazh t1_je7sw5v wrote

Encryption means information is transformed in some way such that it cannot be read or changed by unauthorised parties. Typically some kind of secret key is required to read the original information. Modern cryptography uses fancy maths to achieve this.

But "encryption" is kind of an ambiguous thing. Like a lot of services say they use "military-grade encryption!" but the claim is kind of meaningless. What really matters is what data is encrypted, where and by whom.

In a typical computer messaging service, you have the Sender, the Recipient, and in the middle a Server operated by the service provider (eg. WhatsApp/Meta). The Server is needed because directly communicating between two end user devices over the internet is actually pretty hard. The Recipient device may be switched off or out of service range and unable to receive messages, there may be NAT, firewalls or other barriers to establishing connections etc. So the Server handles all messages, temporarily storing messages for retry later, sending out push notifications etc.

In between these 3 parties, you have additional parties involved. The cafe who provides the WiFi; the ISPs who provide the internet connections; other companies or governments who operate the internet infrastructure between ISPs; hackers or rogue employees who gain access to systems and networks; governments who force companies to provide access etc.

So at the very least you want to ensure that the connection between the user (Sender or Recipient) and Server are encrypted to prevent any malicious parties snooping on your messages. A common encryption mechanism uses a pair of keys: a Public key that can be used to encrypt messages, and a Private key that can decrypt them.

End-to-end encryption is a specific type of encryption that takes it a step further; the message content is encrypted on the Sender device (one end), and only decrypted on the Recipient device (the other end). The Server only has enough unencrypted information to route the messages to the correct users/devices, it doesn't need to decrypt the message content. In theory, only the Recipient has the decryption key, so the messaging service provider cannot decrypt it even if they wanted to (or were forced to).

The problem is, end-to-end encryption does not enforce this. You use an app like WhatsApp to generation the keys. There isn't anything that prevents WhatsApp sending a copy of the Private (decryption) key to themselves and reading your messages when they want to. You're trusting them to do what they claim. Then we get to the last part: what is encrypted. It's only the contents of the message. Metadata like how many messages you send, their size, to whom & when, are all accessible to WhatsApp. So end-to-end encryption sounds good in theory, but it you need to understand is limitations.

1