this post was submitted on 23 Jun 2025
294 points (99.3% liked)
Technology
71843 readers
4505 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/
For France, Your a terroriste if you use signal
Then you're a terrorist if you use the internet, period
Nearly all internet traffic if encrypted, and for plain browser traffic it's probably in the 95+%
You access your bank? Terrorist! Email? Terrorist! Lemmy? Terrorist!
I dunno, I am not the French state. I can only see that they think the usage of signal is making you a terrorist.
Then you're also a terrorist if you use The Guardian 🤷♂️
I dont' know, do you have sources about this ? Or are you imagining thing and deciding it is true ?
Sources for what, exactly? What is "fantasming"? The title of the article you posted is "Criminalization of encryption". The Guardian is using encryption to send messages, so why would they be exempt? In fact, why would any internet use at all not be criminalized? It's all encrypted.
So you read the title and you know everything. There is a liste of what they are accusing and their is no mention of internet
The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior6:
– the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;
– using Internet privacy tools such as VPN, Tor or Tails7 ;
– protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;
– encrypting digital media;
– organizing and participating in digital hygiene training sessions;
– simple possession of technical documentation.
But continue to invent reality. What are fact if not debatable point of view ? That the end for me. Have a great day.
I don't know everything. Just because it's not explicitly listed today doesn't mean it won't be tomorrow. This was just created yesterday. And it does the same thing that all of those listed apps do: facilitates private communication.