• 0 Posts
  • 8 Comments
Joined 6 months ago
cake
Cake day: September 15th, 2024

help-circle



  • Are there any real-world examples where encryption backdoors have been successfully used without compromising cybersecurity?

    No. Adding a backdoor to cybersecurity is fundamentally introducing a vulnerability that can be exploited by an attacker.

    A backdoor in your IT security is like a hidden button to bypass the lock on the impenetrable front door of your impenetrable house. Sure, it makes the police serving a warrant easier, but now there’s a button that anyone can push to bypass your door.

    What you will find are instances with no apparent violations. Just like setting all the nuclear weapons to have the exact same easily remembered activation code didn’t actually lead to a nuclear exchange.



  • Thats not really what happens, unless you’re so toxic that old-twitter would actually ban you.

    Bsky has a “nuclear block”, that essentially removes you and the target from even existing on the version of the site each other see. If you’re ok with just talking to folk who are on your side of a “no, shutup” line, like “trans women are women” or “trans is a mental disorder” you’ll be fine.

    The issue is that a bunch of folk who abscribe to the second apparently just want to troll the first, so they get blocked by their targets, have no fun, and then complain to reporters still on twitter.