Just curious if that is the case. I assume not as Lemmy does not advertise it’s encryption at all.

Would this ever be planned for Lemmy?

  • @nutomicA
    link
    113 years ago

    No, they only have transport encryption with TLS. This is why we recommend Matrix instead. I think Mastodon is working on E2E encryption for ActivityPub, but it seems extremely complicated.

      • @lotanis@discuss.tchncs.de
        link
        fedilink
        510 months ago

        Implementing E2E isn’t just about the encryption though, it’s also about the key exchange/distribution/generation approach.

        If you look at what Matrix does, so much of the complexity comes from how they authenticate all the different clients to manage E2E in a distributed way. For proper E2E you’ve got more than 2 ends (multiple clients) so you need to manage it for all.

        • @Bear_with_a_hammer
          link
          010 months ago

          I don’t get what makes it hard to implement the same stuff using libraries provided, encryption should be optional for servers administrators to enable

            • @themoonisacheese@sh.itjust.works
              link
              fedilink
              English
              110 months ago

              Encryption is also pretty much useless if the thing performing the decryption is served by the people encryption is protecting you against. It would be trivial for a Lemmy instance to serve you backdoored JavaScript as the decryption Algo.

              E2e encryption is a legal device used by companies to remove their liability to give your messages to the government. Because united states v Apple (which didn’t have a ruling but the case made was pretty strong), code is speech and the US gov cannot compel you to change your code, therefore companies that have e2e encrypted comms can say “we don’t know, we have a way of knowing but you can’t make us” whenever the US gov comes in with a subpoena.

              Bear in mind this is only US jurisprudence, there exist jurisdictions in which the government could legally compel an instance admin to serve you backdoored JavaScript and read your messages.

          • @lotanis@discuss.tchncs.de
            link
            fedilink
            110 months ago

            Each crypto operation (“verify the signature of this message”, “encrypt this chunk of data with this key”) is covered by any one of a number of libraries and if you’re writing your own implementation you’re probably doing the wrong thing.

            For the system that you’re trying to build (messaging system, secure boot, HDD encryption, etc) working out which one you need to when is where the difficulty is. What is the overall design of your system - how do keys get exchanged, what is important to protect etc.