this post was submitted on 11 Nov 2024
808 points (97.6% liked)
Technology
59978 readers
3663 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
FOSS implies it's your hardware, therefore a subpoena would extract no information because there is no information outside of the users device.
Interesting, thank you. I guess I don't know enough about FOSS then.
"Free and open source software." It's an ethos that says that code should be free and open for people to use and improve as they see fit. The core of it is that if you modify any software that is FOSS, your software must also be FOSS. So overtime the software and what its used for improve, change, widen. Lucky for us, the movement has been ongoing for 50+ years, so it's a mature ethos whose benefits are everywhere. Most of the internet runs on FOSS. Lemmy itself is FOSS.
It doesn't necessarily mean an app is more private, but it does mean you can generally self host, as the commentor said. There isn't a profit motive with most FOSS, at least not at its core, so there is little desire to data harvest generally. There is also a heavy overlap between FOSS advocates and privacy advocates, so they tend to be more privacy conscious via local data storage or encryption.
Just to key in on the overlap between FOSS and privacy, because the source code for the software is open, it means that anyone can take a peek at how everything is running under the hood (among other things). It becomes possible to verify that software is storing data locally and properly encrypting when applicable (as opposed to blindly trusting the software's author and or lawyers).
It may also be a fun fact that best practice in encryption is to open source your algorithms. The helps safeguard against backdoors and mistakes/ errors that could compromise the security of the algorithm. Much for similar reasons as above, as it allows the security community to check your math (in a field where it is incredibly easy to get your math wrong).
Ok yeah, I understood everything in your first paragraph. The privacy part was what I was really asking about. So if you're not self hosting you're still at the whim of the person/company/whatever that is.
You could also argue that if even if you're not self-hosting (i.e. renting server hardware from a 3rd party), your data is still in a siloed environment. While it may be accessible by law enforcement if you are targeted specifically, it's unlikely to be dragnetted like the data collected from popular apps.