this post was submitted on 18 May 2026
230 points (99.1% liked)

Technology

84783 readers
4640 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] CaptainSpaceman@lemmy.world 32 points 1 day ago (3 children)

Im sure some homebrewed app is more secure lol

[–] bier@lemmy.blahaj.zone 6 points 20 hours ago

IDK about Poland but in Germany I know they just forked matrix and basically did a reskin of I lt afaik

[–] aesthelete@lemmy.world 11 points 23 hours ago* (last edited 23 hours ago)

Yeah because the Polish government cannot possibly create a secure messaging app of their own.

You know before cryptography was a software feature it was a crucial part of statecraft. IMO there is nothing wrong with states building their own secure communication software. It has more precedent than "download a US app"


that may or may not have an NSA backdoor


does.

[–] UnfortunateShort@lemmy.world 22 points 1 day ago

The main problem is control ig. On Signal, someone can ask for a code or passwords to log into your account or get your data. If you have your own solution, you can have physical security keys to verify yourself, making it impossible to give anything to anyone via the internet. You can also monitor logins and make logins on new, unauthorized devices impossible.

Encrypting stuff is not really the hard part of keeping oblivious users safe. As far as that goes, they will be fine if they have people who know what they are doing use established, well audited implementations.