• 6 Posts
  • 330 Comments
Joined 1 year ago
cake
Cake day: January 15th, 2024

help-circle
  • Never said the proetestors aren’t biased. There’s no such thing as an unbiased perspective. I just wanted to make sure that you know that a police report should not be treated as a “factual” report (or copying one should not be counted as “journalism”, as a slight tangent).

    My original point was this (you could have looked it up - it’s not gone):

    The German state is incredibly repressive against solidarity for Palestine.

    How does the fact that the police admit that they arrest protestors for chanting slogans that criticize Israel refute my point in any way?



















  • Sorry, homie. I’m not gonna keep arguing with you if you obviously can’t argue without moving the goal posts, if your life depends on it.

    My point still stands: Encrypting metadata can be sensible/necessary for your threat model and does not count as security through obscurity. You have failed to explain how it would be and then started to attack me, personally.

    Have fun misrepresenting this comment as well, bye.


  • Firstly, if the police confiscate your PC, they already know (and have proven to a judge) that you conduct illegal activity and likely already have enough to convict you of a crime. lol

    Not if it’s for securing evidence. That is only collected before the verdict/conviction. Otherwise, there wouldn’t be any need for a trial.

    Also, your metadata can put others in jeopardy. If you’re busted for being an antifascist activist, who the police deems a “terrorist” and you’re also member of another activist group which up to then wasn’t in the sights of law enforcement, then you’re putting that other activist group’s members in danger.

    Secondly, you can have an account at a private torrent tracker […]

    That wasn’t my argument, though. You can criticise the circumstances that started my example premise, but the point still stands: having metadata that’s clearly visible can be dangerous, because it can give an attacker more information on you (depending on your threat model).

    These are exceptionally poor arguments.

    You’ve actually only attacked my examples, not my argument. My original point still stands: The type of accounts you have can be something you legitimately want/need to encrypt. Not only the credentials.