• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: February 13th, 2024

help-circle
  • Blemgo@lemmy.worldtoTechnology@lemmy.worldX launches E2E encrypted Chat
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    6 days ago

    I’m not the one who you asked, but I’d still give some feedback of my own. Musk as a person is a difficult character. I would even go as far as calling him narcissistic.

    • He got thrown out of PayPal for his incessant micromanagement and disruptions to the flow of the company
    • he bought himself into Tesla to replace the CEO with himself
    • he tends to depict himself as one of the greatest tech geniuses out there, yet often the plans he presents to the public are often poorly thought out and serve no other purpose than to show his “talents”
    • when his proposal to build a tiny submarine for the Than Luang cave rescue was shot down and a British diver was chosen instead he resorted to call the diver a “pedo guy”
    • his latest attempts in politics, especially concerning DOGE feel completely half baked and, again, how he presents himself in his position feels more like an ego trip than something more reasonable
    • he publicly had talks with the controversial German political party “Alternative für Deutschland”, which are currently legally considered “assured right-wing extremists” and have had a history of having Nazis and Nazi sympathisers in their ranks

    I generally can’t trust someone who seems to put himself first at everything to handle anything related to security when the role allows him to exploit it for his own gains. And I do not trust someone who supports political groups known for trying to oppress minorities to defend actual rights for free speech.


  • Blemgo@lemmy.worldtoTechnology@lemmy.worldX launches E2E encrypted Chat
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    7 days ago

    The question is whether this actually is E2EE, as it’s easy to fake by using a man in the middle attack and hard to prove. The only real way to prove it for sure is to run a third party security audit, like Signal does.

    Taking down the old system doesn’t inspire confidence either, as this downtime could easily been used to interrupt old conversations in order to implement a way to decrypt the messages on the servers before passing it on to the actual recipient, as all keys would have to be re-issued.