{"id":38046,"date":"2023-01-03T16:43:45","date_gmt":"2023-01-03T21:43:45","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=38046"},"modified":"2023-01-04T11:02:00","modified_gmt":"2023-01-04T16:02:00","slug":"privacy-is-ok","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2023\/01\/03\/privacy-is-ok\/","title":{"rendered":"Privacy Is OK"},"content":{"rendered":"<p><a href=\"https:\/\/www.nytimes.com\/2022\/12\/28\/opinion\/jack-dorseys-twitter-signal-privacy.html\">Reid Blackman<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=34181707\">Hacker<\/a> <a href=\"https:\/\/news.ycombinator.com\/item?id=34236179\">News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.nytimes.com\/2022\/12\/28\/opinion\/jack-dorseys-twitter-signal-privacy.html\"><p>Like Messages on your iPhone, Facebook Messenger and WhatsApp, Signal uses end-to-end encryption, making it impossible for the company to read the contents of user messages. But unlike those other companies, Signal also refrains from collecting metadata about its users. The company doesn&rsquo;t know the identity of users, which users are talking to one another or who is in a group message. It also allows users to set timers that automatically delete messages from the sender&rsquo;s and receiver&rsquo;s accounts.<\/p><p>[&#8230;]<\/p><p>This level of privacy can be beneficial on a number of fronts. For instance, Signal is used by journalists to communicate with confidential sources. But it is no coincidence that criminals have also used this government-evading technology.<\/p><p>[&#8230;]<\/p><p>What&rsquo;s more, the company&rsquo;s proposition that if anyone has access to data, then many unauthorized people probably will have access to that data is false. This response reflects a lack of faith in good governance, which is essential to any well-functioning organization or community seeking to keep its members and society at large safe from bad actors.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/mer__edith\/status\/1610318882417287169\">Meredith Whittaker<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=34237169\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/mer__edith\/status\/1610318882417287169\">\n<p>OK! let&rsquo;s talk about That Op-ed. The one that insisted not only that privacy is dangerous, but that not affirmatively building surveillance into communication tools is a radical ideological position.<\/p>\n<p>[&#8230;]<\/p>\n<p>The op-ed works to create the appearance of a &ldquo;debate&rdquo; on more or less settled issues. This is a powerful function, bolstered by the NYT imprimatur, which allows it serve as a &ldquo;Potemkin citation&rdquo; -- a seemingly credible reference in support of bad privacy laws and platforms.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.tbray.org\/ongoing\/When\/202x\/2022\/12\/29\/Privacy-is-OK\">Tim Bray<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.tbray.org\/ongoing\/When\/202x\/2022\/12\/29\/Privacy-is-OK\">\n<p>I&rsquo;m sorry to be the bearer of of bad news, but it&rsquo;s simply not possible to address the downside without completely shattering the upside. Here are three reasons why[&#8230;]<\/p>\n<p>[&#8230;]<\/p>\n<p>Privacy is a good thing,\n    <a href=\"https:\/\/medium.com\/i-m-h-o\/privacy-primer-c7b9caadfc67\">one of the benefits of being a member of a\n    civilization<\/a>. People want it and are justified in wanting it.  Now they can have it. There have been no credible proposals for\n    taking privacy away just from the bad people, and I&rsquo;ll be astonished if there ever are.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/pxlnv.com\/linklog\/signal-privacy\/\">Nick Heer<\/a>:<\/p>\n<blockquote cite=\"https:\/\/pxlnv.com\/linklog\/signal-privacy\/\">\n<p>Blackman does not present any evidence for how Signal &mdash; or any comparable application &mdash; would be able to turn the binary question of whether something is end-to-end encrypted into a gradient of access levels. In fact, this whole piece feels very much like a slippery slope argument itself: if you use Signal, you are a &ldquo;witting or unwitting&rdquo; proponent for adding barriers to prosecuting criminals.<\/p>\n<p>This all feels very familiar. One would think prestige newspapers would stop publishing such well-worn ideas without further development of their arguments but, well, here we are.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/12\/27\/archive-of-the-twitter-files\/\">Archive of the Twitter Files<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/12\/07\/advanced-data-protection-for-icloud\/\">Advanced Data Protection for iCloud<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/12\/23\/fbi-guide-to-getting-messaging-data\/\">FBI Guide to Getting Messaging Data<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/01\/19\/signal-review\/\">Signal Review<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/02\/17\/fbi-asks-apple-for-secure-golden-key\/\">FBI Asks Apple for Secure Golden Key<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Reid Blackman (Hacker News): Like Messages on your iPhone, Facebook Messenger and WhatsApp, Signal uses end-to-end encryption, making it impossible for the company to read the contents of user messages. But unlike those other companies, Signal also refrains from collecting metadata about its users. The company doesn&rsquo;t know the identity of users, which users are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2023-01-03T21:43:48Z","apple_news_api_id":"fb11af1d-57c1-46d6-a17d-ed342f805143","apple_news_api_modified_at":"2023-01-04T16:02:03Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/A-xGvHVfBRtahfe00L4BRQw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[31,2185,26,355,1672,1456,96],"class_list":["post-38046","post","type-post","status-publish","format-standard","hentry","category-technology","tag-ios","tag-ios-16","tag-iosapp","tag-privacy","tag-signal","tag-the-new-york-times","tag-web"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=38046"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38046\/revisions"}],"predecessor-version":[{"id":38056,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38046\/revisions\/38056"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=38046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=38046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=38046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}