On December 14, James Harr, the owner of an online store called ComradeWorkwear, announced on social media that he planned to sell a deck of “Most Wanted CEO” playing cards, satirizing the infamous “Most-wanted Iraqi playing cards” introduced by the U.S. Defense Intelligence Agency in 2003. Per the...
Do protocols solve the problem of every hop in between you and the destination has to pass through what amounts to someone else’s private property? Some private servers owned by who knows who on the way between that we have no idea whether they’re inspecting every packet that comes through or not.
Because that’s the bigger issue, and I’m not even sure it’s one we can solve, because it’s pretty important to how the internet functions.
A protocol still has to be supported and passed through private corporations walled gardens.
Who else remembers Comcast illegally using Sandvine to throttle bittorrent traffic specifically? Pepperidge Farm 'members.
https://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/
That’s what integrity checks are for, so that no one along the path can edit what you say before it actually gets published.
That’s rather missing the point, an integrity check doesn’t solve the fact that to communicate with anyone, you have to do it through giant corporations pipes.
An integrity check doesn’t help when an ISP have straight blocked your protocols traffic, like Comcast previously did with bittorrent.
Can we stop sucking down the preachings of an idiot like Jack Dorsey? We don’t actually have net neutrality, so it’s totally within their current rights to just block traffic they don’t like.
Almost any protocol can be wrapped in any other protocol. You could, say, use bit torrent by encoding the packets and embedding the data in valid png files, then transporting them over http. As long as both sides understand the wrapping it’ll work just fine.
I’ve even seen http tunneled over DNS queries in order to completely bypass firewalls.
Could always use a vpn or tor
https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network
VPN’s also by definition still use the same corporate pipes as anything else.
Nothing in this world is ever 100% complete, but decentralization and protocols are extremely good combat measures. It is possible to poke holes in almost anything. But that does not mean it’s not worth trying.
Woosh. We’re decentralizing everything except the hardware and everyone’s like bUt iTs dEcEnTrALiZeD!
Meshtastic and reticulium.
Now that’s an answer I can get behind.