I dont want my network mining my data and selling it to marketing companies, which is a thing now.
-
-
-
Replying to @PMyB
Okay but 1) part of this is mitigated by TLS and 2) the part that isn't (domain names you visit) is not addressed by end-to-end encryption
2 replies 0 retweets 0 likes -
TLS is end to end encryption. And DNS-over-HTTPS uses it to prevent ISPs spying on your DNS lookups.
0 replies 0 retweets 2 likes -
This Tweet is unavailable.
-
This seems like a pretty meaningless distinction to me. If the actors are me and the website I'm interacting with, TLS secures the communication between us.
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
E2E has a specific technical meaning that is the crux of this debate. The distinction is important
1 reply 0 retweets 0 likes -
Is the implication that the government wouldn't want a backdoor into TLS communications along similar lines?
1 reply 0 retweets 0 likes
TLS communications are point to point, as @tweetdkp pointed out. If you want to eavesdrop on them, you do it at the junctions. You don't need to break TLS encryption when you can take a warrant to whoever runs the server
-
-
Fair enough, it's not e2e. It's meaningful to ask if your ISP can intercept your TLS communications, though - and warrants only work when the target is in the same jurisdiction, and the adversary is law enforcement.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.