Just curious if that is the case. I assume not as Lemmy does not advertise it’s encryption at all.

Would this ever be planned for Lemmy?

    • lotanis@discuss.tchncs.de
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Implementing E2E isn’t just about the encryption though, it’s also about the key exchange/distribution/generation approach.

      If you look at what Matrix does, so much of the complexity comes from how they authenticate all the different clients to manage E2E in a distributed way. For proper E2E you’ve got more than 2 ends (multiple clients) so you need to manage it for all.

      • Bear_with_a_hammer
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        I don’t get what makes it hard to implement the same stuff using libraries provided, encryption should be optional for servers administrators to enable

          • themoonisacheese@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Encryption is also pretty much useless if the thing performing the decryption is served by the people encryption is protecting you against. It would be trivial for a Lemmy instance to serve you backdoored JavaScript as the decryption Algo.

            E2e encryption is a legal device used by companies to remove their liability to give your messages to the government. Because united states v Apple (which didn’t have a ruling but the case made was pretty strong), code is speech and the US gov cannot compel you to change your code, therefore companies that have e2e encrypted comms can say “we don’t know, we have a way of knowing but you can’t make us” whenever the US gov comes in with a subpoena.

            Bear in mind this is only US jurisprudence, there exist jurisdictions in which the government could legally compel an instance admin to serve you backdoored JavaScript and read your messages.

        • lotanis@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Each crypto operation (“verify the signature of this message”, “encrypt this chunk of data with this key”) is covered by any one of a number of libraries and if you’re writing your own implementation you’re probably doing the wrong thing.

          For the system that you’re trying to build (messaging system, secure boot, HDD encryption, etc) working out which one you need to when is where the difficulty is. What is the overall design of your system - how do keys get exchanged, what is important to protect etc.