And, as an exaple of a related issue. We are also not understanding the implications of these complex systems. As an example, WhatsApp offers end to end encryption and tells us users that chats cannot be restored without our pin. Now, this pin is usuallt 4-6 digits. Ok, so our encryption keeys are them selves encrypted by a 4-6 digit pin, and we are supposed to beleive that is sufficient to stop Meta from decrypting them? This is ridiculus. Of course, if they wanted, that could do that in some 1 second or similar time frame.
tisdag 28 april 2026
We are focusing on the wrong issues with IT infrastructure
There is so much talk about US tech and end to end encryption. These things are not wrong to care about. But with closed source code and these extremely complex data flows in modern IT environments, it is obvious that ypu as a user have no overview what so ever when it comes to where data is going and what is done with it. This complete lack of transparancy and dataflow overview is a much more critical and hard to solve issue than encryption here and there.
Prenumerera på:
Kommentarer (Atom)