Rushyo πŸ‡ͺπŸ‡Ί is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.
7a62d3e21b9708f0

Rushyo πŸ‡ͺπŸ‡Ί @Rushyo

@xor @yellowfrog it's worthwhile exploring some of the reasons why people feel phone numbers are private/valuable (without judging them). Off the top of my head:

1) Single phone number -> person mapping means hard to compartmentalise different identities
2) Possibility of harassment tied to knowledge of phone (why people want to keep emails addresses secret too)
3) Expensive to discard phone number, so permanent identifier
4) Phone co. can map to name/address

@bea @maloki are you sure there's enough hours left in the day for that? ^.~

This is really going too far. You can't just randomly slander people you don't like. <a href="https://social.heldscal.la/file/b77f63459ed1ef99fe9abc7befd9abe943937f7bb6ddaf85a41d3e8125cb6656.jpg">https://social.heldscal.la/attachment/411208</a>

@lambadalambda Their CoC:

"Behaviour towards users
Limit the scope of bans as much as is feasible.
Behaviour towards other operators
Be civil to other operators at all times."

Hmmmmmmm.

It's almost as if tech journalists do the bare minimum of research before moving on to the next topic. Or that the tech industry has become so focused on chasing giant piles of money that nobody can remember a time when true successes on the internet were achieved by hobbyists working on passion projects with no regard for how much money they might make

<p>Phone numbers are to Signal as social security numbers are to credit applications: a unique ID that was designed for a specific purpose but coopted for other identification needs, to the point that now people think the two purposes are related.</p>

At its most basic, #TootCrypt will protect against snooping of messages by any party, spoofed identities, active tampering, MITM attacks, and more.

In principle, it could do far more by trading off against UX: including protecting against meta-data analysis, evading detection within the network, and being de-coupled from any third-party API.

I wonder if it will ever prove necessary/desirable to do those things.

*shrugs*

Whilst I kid about 'shitpost steganography', #TootCrypt is designed with resilience in mind.

One of the design precepts is that it can be made to survive *even if all of the Fediverse is actively hostile to it*, including devs, admins, users, and other actors.

Although in practice the protocol won't have this sort of resilience caked in at birth (redundant), it's important the architecture allows it to pivot that way if necessary. It's a good property for a privacy-protecting channel to have.

<p>Russian-controlled telecom hijacks financial services’ Internet traffic<br><a href="https://arstechnica.com/security/2017/04/russian-controlled-telecom-hijacks-financial-services-internet-traffic/"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2017/</span><span class="invisible">04/russian-controlled-telecom-hijacks-financial-services-internet-traffic/</span></a></p>

@TrollDecker Meanie 😞 I want a go with the pointy shiny thing!

Hmph πŸ˜‘

@TrollDecker *pokes the pointy thing* pointy shiny thing.

@clacke I read the full ruling and the directive and I'm not seeing it, but eh, I'm just a student 😊

@TrollDecker Ace, you can do my law work for me then. I'll sleep for you ;P