Three months ago I posted about the Atlantic Council’s interest in the controlling the fediverse: https://lemmy.ml/post/6641106

I think these projects are the continuation of the successful American “intelligence community” censorship of corporate social media platforms. They even tried to formalize the system two years ago as the Disinformation Governance Board.

  • Troy@lemmy.ca
    link
    fedilink
    arrow-up
    12
    ·
    10 months ago

    Yeah, good luck with that. Controlled given instances might be achievable, but the protocol will eventually route around the damage.

    • davel [he/him]@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      10 months ago

      I think that is engineer’s disease thinking.

      Running instances costs money & labor, and I predict that many instance admins will be happy to accept various forms of assistance, and the CIA/FBI/etc-backed organizations will be happy to help. The assistance might be just money, which comes with strings attached such as simply having the ear of the admins. The assistance might be “moderation tools,” to save labor efforts.

      I think the instances that choose to federate with corporate social media (which are already captured by feds) will probably be the easiest to gain control of. If you’ve been following the corpo federation discourse, you might have noticed that the instances with the largest user bases tend to be the most interested in federating with the corpo social media.

      • Troy@lemmy.ca
        link
        fedilink
        arrow-up
        13
        ·
        10 months ago

        Do they also control email? As in all email servers that are “federated” with one another? Conspiracy thinking is dangerous. Maybe I work for “the feds”? Maybe you do and you’ve already been subverted against your own conscious wishes and this is a honeypot you’re posting?

        At some point you have to trust something or someone or you end up in the trust-equivalent of solipsism.

        I recommend this old paper from the early days of compsci – Ken Thompson: https://fermatslibrary.com/s/reflections-on-trusting-trust

        The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)

        Take this and abstract. Eventually you’ll either need to be a wholly offline hermit, or accept that there is risk of subversion at every level and that risk must be tolerated in order to use the tech.

        • davel [he/him]@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          17
          ·
          edit-2
          10 months ago

          Your rebuttal to engineer’s disease is to quote Ken Thompson chefs-kiss

          From Michael Parenti’s Dirty Truths:

          Those who suffer from conspiracy phobia are fond of saying: “Do you actually think there’s a group of people sitting around in a room plotting things?” For some reason that image is assumed to be so patently absurd as to invite only disclaimers. But where else would people of power get together – on park benches or carousels? Indeed, they meet in rooms: corporate boardrooms, Pentagon command rooms, at the Bohemian Grove, in the choice dining rooms at the best restaurants, resorts, hotels, and estates, in the many conference rooms at the White House, the NSA, the CIA, or wherever. And, yes, they consciously plot – though they call it “planning” and “strategizing” – and they do so in great secrecy, often resisting all efforts at public disclosure. No one confabulates and plans more than political and corporate elites and their hired specialists. To make the world safe for those who own it, politically active elements of the owning class have created a national security state that expends billions of dollars and enlists the efforts of vast numbers of people.

          As for email, you say that as if Edward Snowden revealed nothing, or that the US doesn’t have a history of injecting backdoors into encryption standards.

      • originalucifer@moist.catsweat.com
        link
        fedilink
        arrow-up
        8
        ·
        10 months ago

        so you agree the only instances that can be compromised are ones that choooose to do so.

        i think most of what you wrote here is wrong, and i have about as much to back it up as you do.