28 votes

Topic deleted by author

4 comments

  1. [4]
    Comment deleted by author
    Link
    1. [3]
      ReAn
      Link Parent
      The problem is that it's not this simple. Take a look at the IXMaps Project this shows the anomalies in how data flows on the internet. Even if you're in Spain and transmitting to Sweden, the...

      The problem is that it's not this simple. Take a look at the IXMaps Project this shows the anomalies in how data flows on the internet.

      Even if you're in Spain and transmitting to Sweden, the traffic may go through the UK, which means it's directly through a 5-eyes monitoring location.

      7 votes
      1. [2]
        time
        Link Parent
        This is why end-to-end encryption is so important for all online communications. They might be able to know which IP address is talking to which, but they won't have any means of intercepting data...

        This is why end-to-end encryption is so important for all online communications. They might be able to know which IP address is talking to which, but they won't have any means of intercepting data is everything is using encrypted communication channels.

        2 votes
        1. ReAn
          Link Parent
          And more importantly, there's nothing for the "Tech World" to disclose, even if they wanted to (and most don't want to, simply because it's a cost the government forces on them to do business).

          And more importantly, there's nothing for the "Tech World" to disclose, even if they wanted to (and most don't want to, simply because it's a cost the government forces on them to do business).

          2 votes
  2. ourari
    Link
    This comes after already trying - and failing - several times to legislate this in several countries in the past few years.

    This comes after already trying - and failing - several times to legislate this in several countries in the past few years.

    2 votes