←back to thread

596 points pimterry | 4 comments | | HN request time: 0.001s | source
Show context
lifeisstillgood ◴[] No.36862777[source]
I kind of get both sides here. If we take the "see the best of others intentions" then a web that is populated by identified humans (and their authorised proxies!) is likely to be the "cleanest", most ideal web space we can see (a web full of sock puppets and link farms is not ideal).

The clearest end point for this is some government issued digital ID that just asserts who you are, acts as a login etc.

You can see this as a stepping stone to there. if you squint.

Is it the idealism of the 70s coke to life? No. Is it some sane compromise - I think so.

What if we cannot trust our government ? Sorry it is pretty sure that no internet is going to solve that. That's on the real world.

replies(10): >>36862946 #>>36863031 #>>36863074 #>>36863126 #>>36863250 #>>36863286 #>>36863456 #>>36863735 #>>36864436 #>>36871915 #
codedokode ◴[] No.36863250[source]
> web that is populated by identified humans

This is not going to work. The governments will create millions of fake identities to spread their propaganda, same way as they are making fake passports for spies.

replies(2): >>36863406 #>>36863852 #
mike_hearn ◴[] No.36863406[source]
But websites don't care about government-issued IDs. They have their own IDs, and to create those you have to fill out a form. If the form is successfully rate limited then the cost and speed at which fake IDs can be created gets prohibitive even for governments, unless you think they only need a small number of accounts.
replies(1): >>36863865 #
freedomben ◴[] No.36863865[source]
You don't think the governments will force Apple, Google, etc to attest their things? I mean, they made them provide access to their firehose of data so they could mine it for metadata...
replies(1): >>36864060 #
mike_hearn ◴[] No.36864060[source]
We're talking about the same Apple that's currently threatening to yank some of its most popular products from the UK rather than disable e2e encryption? The same Google that reacted to the Snowden memos by putting the entire engineering division in an encryption Code Red, such that inter-dc links were almost fully encrypted just a few weeks later?

And that's for morally ambiguous cases where the justification is popular and well established things like crime fighting, child porn and so on.

We don't know what will happen in future, but given the story so far, the chances of these companies saying to governments, sure, have 500,000 free accounts so you can spam our users with incompetent political propaganda, is virtually zero.

replies(1): >>36864489 #
1. freedomben ◴[] No.36864489{3}[source]
Yes, we're talking about the same Google that only reacted that way to PRISM when a leaker blew the whistle (do we need to wait/hope for a whistle blower for every government thing they comply with?). The same Apple that moved the data for all Chinese customers to data centers where the CCP can access/monitor them. The same Apple that censors/filters the app store for Chinese users to enforce government policies.

The chances that they would comply with future government requirements cannot possibly be "virtually zero."

replies(1): >>36864921 #
2. mike_hearn ◴[] No.36864921[source]
China is kinda irrelevant here because western social networks and services are blocked there anyway, so the Chinese government can indeed compel Chinese companies to spam users with political propaganda (and does), but western companies are irrelevant in that process.

For Google and PRISM, I'm sure it won't change your mind, but I worked there at the time and the reaction was genuine. If there were people inside the firm who knew about it at all it must have been a very small group of spies/double agents, and such people were never detected despite a thorough search. Given that it was all based on fiber taps done by telcos though, it's not clear why they'd need any insiders. The assumption of formal cooperation was based on the phrasing of one or two sentences in some leaked documents, but the way the whole thing was set up didn't actually require it so, what those insiders would have been doing was a bit unclear.

Anyway, this is all by the by. We can't know what will happen in future. But if they won't budge on E2E encryption then it seems unlikely they'd be willing to bypass anti-spam measures, which is far more detectable, far less justifiable, and probably doesn't fit within any existing laws.

replies(1): >>36865059 #
3. freedomben ◴[] No.36865059[source]
Thanks, that actually does make me feel a bit better about Prism.

Do you have any experience with how things have changed over the last few years at Google?

I have a friend who said that 2016 was really a turning point in the culture. Prior to that most people were all about liberal values like free speech, and user freedom, but in the last 6 or 7 years it's become very "moderation" or "censorship" friendly (depending on your views), including for things like OP topic. On the plus side he has said that privacy is don't that used to be an after thought of anything, but is now in the cultural zeitgeist, do it's not all bad. Do you have any experience you're willing to share on that?

replies(1): >>36865491 #
4. mike_hearn ◴[] No.36865491{3}[source]
I left in 2014 so don't know what happened after that. It does seem that 2016 was a turning point for a lot of institutions. The Google that believed in empowering people through "making the world's information universally accessible and useful" was definitely dead by that point, although they still claim that's the mission.

I don't agree that privacy was an afterthought before then. There were a lot of internal controls and privacy considerations had been a part of the design process even when I first joined in 2006. Of course the level of effort ramped up over time as the company grew. The primary constraint then as now was simply that most users trust tech firms, don't include them in their threat model and will reject even tiny amounts of inconvenience in the name of privacy. So that really heavily constrains what can be done. For example it kills most attempts at proper end-to-end encryption, leaving us with this sort of strange pseudo-e2e-encryption that's more a legal hack than anything serious (the company that supplies you with the encryption equipment is your adversary, which makes no sense in any classical conception of cryptography).