The UK parliament passed bill to outlaw encryption

IMHO, everything is at least a little bit political. Even in my field of expertise, health, politics is unavoidable and in certain problems is a huge factor. I guess that maybe it’s better to say that we should avoid talking about politicians and political parties, instead of “politics” altogether since clearly technology is and has been a hot topic in global politics for a while now; and what we may and may not do (or even say) is heavily influenced by the political climate. But that’s just an opinion. :metal:

Let’s put it this way. If we follow historical statistics, every government that has taken freedom and choices away from it’s citizens for any reason has lead to increasingly poor conditions. No one wants to be controlled.

Until citizens are finally controlled so far, they are basically controlled into a corner, that the will of the citizens break, and revolution occurs. It’s a regularly written and re written story in history. It’s unfortunately looking like we’re getting closer to the end again.

This is just another “inch” of control pushing it closer.

There’s a famous saying that asks “How do you eat an elephant?”. The answer -one bite at a time. . .

It will happen again unless we stop it. The two question really to be begged about this is warning are:

What are you doing - Are you helping allow this to happen/are you part of the problem?

Are you ready when it does? if not, you may want to look at history and figure out who in that story you want to be.

5 Likes

North Korea was right - Red Star OS is the future. Truly it was more “advanced” than anything even Micro$oft could have dreamed up.

“The operating system comes pre-installed with a number of applications that monitor its users. If a user tries to disable security functions, an error message will appear on the computer, or the operating system will crash and reboot. In addition, a watermarking tool integrated into the system marks all media content with the hard drive’s serial number, allowing the North Korean authorities to trace the spread of files. The system also has hidden “anti-virus” software that is capable of removing censored files that are remotely stored by the North Korean secret service. There is a user group called “administrator” in the operating system. Users do not have root access by default, but are able to elevate their privileges to root by running a built-in utility called “rootsetting”. However, provisions are made in kernel modules to deny even root users access to certain files, and extensive system integrity checks are done at boot time to ensure these files have not been modified.”

1 Like

Now, tell me, how is that different from iOS or Android? It isn’t, it’s exactly the same.

They are speaking about this right now:

1 Like

The Brits are at it again.

1 Like

3 Likes

UK legislation has cleared the UK Parliament and is just awaiting Royal assent.

:clown_face: :earth_africa:

It’s time to protest really hard dear brits, that sh*t will backfire whole world extremely hard.

This whole topic is wrong. The UK isn’t trying to ban encryption.

“such as client-side scanning (CSS), on any device before the content is sent.”
Why ban encryption when you can do a client-side scanning ? Tech is not ready yet but they are working on it ?

1 Like

Is it really necessary to pedal propagandist fact-check bs?

Does it ban end-to-end encryption?

No. The law as passed contains a provision that could require messaging platforms to use “accredited technology” to identify particular kinds of content, particularly terrorism content and child sexual abuse material (CSAM), if they receive a notice to do so by the communications regulator Ofcom.

But in order to issue such a notice, Ofcom has to consider it “necessary and proportionate” and the technology itself must be accredited. No accredited technology currently exists, and Ofcom is yet to set out how it would go about accrediting such technology.

tl;dr

No! → Proceed to explaining EXACTLY scanning technology that would nullify e2e :rofl:

2 Likes

Is it really necessary to post this misinformation. Because that’s what it is!

You do realize that it is you who just posted blatant misinformation (i prefer to call it old fashioned lie)?

The fact is they are passing laws to protect people. Kids! Maybe yours? Or mine or someone else’s. That’s what it’s about. It’s not about taking away someones rights or banning encryption and all the other bs people want to go on about. It’s about stopping criminal activity that destroys peoples lives.

Ok, i have a bridge to sell you! :clown_face:

But it does not break the e2e encryption. It will just send one copy to your contact and the other copy to the police. All perfectly encrypted. :rofl:

3 Likes

1416e2e1ee002904951dc16abbf869f8

:rofl:

I agree it does not band E2E encryption - it aims to render it completely useless. Not the same thing, but hardly an improvement.

As for the claims that this is to protect children, I guarantee you that it will also be used to identify suspected terrorists, snoop on political activists etc. Because once the technology is implemented at the device level to scan for CSAM, other laws exist which would allow the police and security services to exploit the capability for other purposes. And the UK has a pretty awful track record of treating political activists like criminals and terrorists.

1 Like