Hacker Newsnew | past | comments | ask | show | jobs | submit | fazfq's commentslogin

COVID-19 restrictions, jesus. What is this 2020?


This is the appropriate response. It's more about China saving face and their attempt to maintain control than actual Covid-19 prevention, although there is some of that too.

They had a choice to accept Pfizer and Moderna early on and chose not to. Now they're paying for it politically, socially, and epidemiologically.


The l looks taller than the 4 to me, which makes it clear it's not another number


Looks like a one to my bad eyes.


I live in the south and if anything I'm glad that the fucking summer is finally over. I had SAD in spring because of my allergies and because I know that the heat is coming though.


Whoa did you just deny a CIA narrative?


I'm daring like that.


In places of the EU, especially close to the sea, tap water fucking sucks. You end up with kidney stones if you drink it every day. Stop romanticising the EU so much for fuck's sake.


Chill the heck out, I was very obviously talking about the UK, and parts of Europe, not all of it. We don't all have politicised motivations or a desire to 'one up' continents.


What did you expect? Messages have to be stored on the server, and the instance owner has access to the server...


(Hypothetically) wouldn't it be possible for client devices to generate key pairs, and for messages to be stored on the server encrypted in such a way that recipients' client devices could decrypt them? (I think that's what Signal does?)

Not saying that that's what happens on Mastodon instances, I don't know enough about it's operation to comment.


Yes, end-to-end encryption is possible. It just needs support in clients, as well as a common protocol if you want it to work between different clients.

Mastodon has actually done some work towards that but I don't think it's useable yet, see https://github.com/mastodon/mastodon/pull/13820


Thanks!


Normal users do not understand what federation is, much less how messages are stored.


This has nothing to do with federation. It's just a fact of life on any hosted internet service.


Chances of a centralized Twitter stealing your sensitive information is quite a bit lower than N number of federated Mastodon instances run by any number and types of actors.


Not if end-to-end encryption is available.


If you don't own the key exchange (and you don't, even on the services most people consider secure), you're still, on some level or another, just relying on trust that this is the case.

At any rate, mastodon is a web app, not an IM client. No one who's ever raised this has even begun to explain how you could work e2e into something like it. Certainly no other microblogging platform has e2e anything, because that's not actually a thing that makes sense.


> because that's not actually a thing that makes sense.

No for micro-blogging, but Mastodon supports direct messaging, and if you support direct messaging, you should support end-to-end.

> If you don't own the key exchange ...

Sure, but I trust https://letsencrypt.org/ more than I trust some random running a server.


> No for micro-blogging, but Mastodon supports direct messaging, and if you support direct messaging, you should support end-to-end.

No other microblogging service with DM support has e2e anything. Because they're websites. To have meaningful e2e you need to have key exchange and device keys, and if you have a website you can look at your DMs on then the website has to have a key. If the website has a key the owner of the website can look at your DMs. This is just fundamental to hosted web services, and it's why if you use icloud messaging with imessage you're no longer guaranteed e2e, and why signal just doesn't even have a website for you to use.

> Sure, but I trust https://letsencrypt.org/ more than I trust some random running a server.

LE has nothing to do with this? The key exchange I'm talking about is the end keys. User keys. LE doesn't provide those. For e2e IM systems a server has to manage user/device:key mappings, and are a central point of trust. They can potentially inject a "listening key" into your recipient list without you knowing and tap you or even impersonate you (but only in a forward way).

E2E is not a panacea, but it's also largely irrelevant to websites.


That's wrong. A "website" can do e2ee. You just need to do the encryption/decryption on the client side. Protonmail does that, Mega, etc.


Eh, if you don't trust your masto instance admin to not read your DMs do you really trust them to not break the "your password never leaves the client" guarantees that protonmail for eg. promises?

This is the thing about this argument: Either you trust your instance admins or not. If they promise you e2e and you don't trust them, you should rightly look at that as snakeoil.


This is meaningless if you don't trust the site admins, and the reason to use e2ee in the first place is to avoid trusting the site admins. All it takes is for them to serve you different JavaScript one time that exfiltrates your messages, and I guarantee you'll never notice.


> LE has nothing to do with this?

You probably want a CA signing the public keys that you store on the site.

> They can potentially inject a "listening key"

You mean a MITM attack? Isn't that the reason for certificate authorities?


Sorry, you seem to be confusing HTTPS with E2EE. Mastodon already uses HTTPS for all its traffic, including the traffic between servers.


No, I'm not (I'm not a total fucking idiot).

What I'm suggesting is that the same certificate infrastructure that is used to secure the connection between a server and a client could also be used to secure the connections between users.

There's nothing specific to HTTPS about CAs and trust chains.


But for encrypted DMs you need per user keys that are stored on the users computer, otherwise the owner of the server has control over the key and we're back at square one. Or am I somehow misunderstanding you?


You can use client side symmetrical crypto to allow for the private key to be stored on the server.

It means that weak keys are a problem, but that's been the case since the dawn of time.


The foundations for E2EE were merged into Mastodon, there's a merged pull request for it elsewhere in this thread.


Go look at that PR and read the details and ask yourself who you have to trust with a list of device keys you're encrypting your dm for.

You might be surprised to discover that you're still trusting an instance admin.

It does improve some things, potentially, in terms of intermediaries being able to read things, but there are a lot of things that are still reliant on trusting your admin, or are outright unclear how they'll work in practice.

That said, I take back that "no one has begun to explain..." - they've begun. But so far they've kinda just thrown some well established protocols at it but not done much to explain how it really helps the "trust your admin" problem.


Mastodon is an interesting case because it was a splinter of Twitter but it basically had the same moderation policies so it was the same thing and imo had no appeal of its own. Now with Musk it's possible that things will change in Twitter's policies so Mastodon may become useful, but we'll see.


It's not only a verification service, you get more features.


Isn't putting whatever you want next to a popular guy's tweets enough payment?


"empowers" is such a red flag in my book...


Sounds like its time for a new book, but you don't have to take my word for it...


Or stop using rhetorical buzzwords and the language of demagoguery.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: