this post was submitted on 14 Jan 2024
50 points (84.7% liked)

Fediverse

17852 readers
15 users here now

A community dedicated to fediverse news and discussion.

Fediverse is a portmanteau of "federation" and "universe".

Getting started on Fediverse;

founded 5 years ago
MODERATORS
 

Three months ago I posted about the Atlantic Council’s interest in the controlling the fediverse: https://lemmy.ml/post/6641106

I think these projects are the continuation of the successful American “intelligence community” censorship of corporate social media platforms. They even tried to formalize the system two years ago as the Disinformation Governance Board.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 11 months ago (1 children)

Yeah, good luck with that. Controlled given instances might be achievable, but the protocol will eventually route around the damage.

[–] [email protected] 19 points 11 months ago* (last edited 11 months ago) (2 children)

I think that is engineer’s disease thinking.

Running instances costs money & labor, and I predict that many instance admins will be happy to accept various forms of assistance, and the CIA/FBI/etc-backed organizations will be happy to help. The assistance might be just money, which comes with strings attached such as simply having the ear of the admins. The assistance might be “moderation tools,” to save labor efforts.

I think the instances that choose to federate with corporate social media (which are already captured by feds) will probably be the easiest to gain control of. If you’ve been following the corpo federation discourse, you might have noticed that the instances with the largest user bases tend to be the most interested in federating with the corpo social media.

[–] [email protected] 11 points 11 months ago (1 children)

Do they also control email? As in all email servers that are "federated" with one another? Conspiracy thinking is dangerous. Maybe I work for "the feds"? Maybe you do and you've already been subverted against your own conscious wishes and this is a honeypot you're posting?

At some point you have to trust something or someone or you end up in the trust-equivalent of solipsism.

I recommend this old paper from the early days of compsci -- Ken Thompson: https://fermatslibrary.com/s/reflections-on-trusting-trust

The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)

Take this and abstract. Eventually you'll either need to be a wholly offline hermit, or accept that there is risk of subversion at every level and that risk must be tolerated in order to use the tech.

[–] [email protected] 11 points 11 months ago* (last edited 11 months ago)

Your rebuttal to engineer’s disease is to quote Ken Thompson chefs-kiss

From Michael Parenti’s Dirty Truths:

Those who suffer from conspiracy phobia are fond of saying: “Do you actually think there’s a group of people sitting around in a room plotting things?” For some reason that image is assumed to be so patently absurd as to invite only disclaimers. But where else would people of power get together – on park benches or carousels? Indeed, they meet in rooms: corporate boardrooms, Pentagon command rooms, at the Bohemian Grove, in the choice dining rooms at the best restaurants, resorts, hotels, and estates, in the many conference rooms at the White House, the NSA, the CIA, or wherever. And, yes, they consciously plot – though they call it “planning” and “strategizing” – and they do so in great secrecy, often resisting all efforts at public disclosure. No one confabulates and plans more than political and corporate elites and their hired specialists. To make the world safe for those who own it, politically active elements of the owning class have created a national security state that expends billions of dollars and enlists the efforts of vast numbers of people.

As for email, you say that as if Edward Snowden revealed nothing, or that the US doesn’t have a history of injecting backdoors into encryption standards.

[–] [email protected] 7 points 11 months ago (1 children)

so you agree the only instances that can be compromised are ones that choooose to do so.

i think most of what you wrote here is wrong, and i have about as much to back it up as you do.

[–] [email protected] 1 points 11 months ago (1 children)

The ones that don’t choose to may eventually find themselves defederated from the ones that do. We’ll get walled off from the large instances that “play ball”.

[–] [email protected] 3 points 11 months ago* (last edited 11 months ago) (1 children)

uh huh. k. cool story. let me know if you ever get anything to actually back up that claim.

let me rephrase.. your conjecture is unfounded, and hyperbolic.

[–] [email protected] -2 points 11 months ago (1 children)

RemindMe! 4 years "federation is going great"

[–] [email protected] 2 points 11 months ago (1 children)

see; proof you have nothing but hopes and dreams. just like me!

ha '''you just wait, in 4 years i may be right!' hilarious

[–] [email protected] 3 points 11 months ago