☆ Yσɠƚԋσʂ ☆@lemmy.ml to Privacy@lemmy.mlEnglish · 1 day agoTelegram Hands U.S. Authorities Data on Thousands of Userswww.404media.coexternal-linkmessage-square97fedilinkarrow-up175arrow-down11cross-posted to: world@lemmy.world
arrow-up174arrow-down1external-linkTelegram Hands U.S. Authorities Data on Thousands of Userswww.404media.co☆ Yσɠƚԋσʂ ☆@lemmy.ml to Privacy@lemmy.mlEnglish · 1 day agomessage-square97fedilinkcross-posted to: world@lemmy.world
minus-squaredavel@lemmy.mllinkfedilinkEnglisharrow-up3arrow-down1·10 hours agoThe double ratchet algo is irrelevant if the app is doing something else altogether.
minus-squareKairos@lemmy.todaylinkfedilinkarrow-up2arrow-down2·10 hours agoCompiling the app is irrelevant if I don’t read the source.
minus-square☆ Yσɠƚԋσʂ ☆@lemmy.mlOPlinkfedilinkarrow-up3arrow-down2·9 hours agoThat’s nonsense, because many different people read the source and audit open source software. While it’s certainly possible to sneak malicious code in, the trust doesn’t depend on each single individual auditing it. It’s a collective effort.
The double ratchet algo is irrelevant if the app is doing something else altogether.
Compiling the app is irrelevant if I don’t read the source.
That’s nonsense, because many different people read the source and audit open source software. While it’s certainly possible to sneak malicious code in, the trust doesn’t depend on each single individual auditing it. It’s a collective effort.