> That conclusion is logically wrong and does not follow from the premises.
I am not saying "the good argument is moderation" (argument to moderation fallacy), I'm saying "the two extremes are obviously wrong, and, it turns out, the middle is smarter".
The argument to moderation fallacy is when you are saying that the good answer is good because it is in the middle. I don't do that, I find the good answer and I just state that it happens to be in the middle.
I guess you are also doing a fallacy: "every solution that are in the middle is wrong because it can only be the result of the argument to moderation". It is obviously incorrect, there are plenty of solution that happens to be good and being in the middle.
> Then the logical course of action is to try to stop this legislation.
First, I'm not saying that we should not stop this legislation. I'm just answering to a comment saying "and then what", which is a discussion that we are, I hope, allowed to have.
But secondly, a very good way to stop this legislation is by proposing something that checks all the boxes used to justify this legislation while having way better safeguard.
What is your strategy? To say to people that are worried "yeah, well, too bad for you". Or to say "oh, I understand your point, why not this solution, which do what you want, and also avoid what I'm afraid of".
Of course, we both know that one reason this legislation exists is because government want to spy on us. But if we propose something that satisfies all their justifications, they will have to either drop the pretends and openly admit that want to spy (and lose the support of people who are worried), or accept the solution where they cannot spy.
> There’s no such thing as keys that only good guys have access to. It has been shown time and again that someone with access will abuse it or be tricked.
This argument is a footgun: if indeed you cannot trust no-one, then EVERY online communication is already compromised. Your phone is full of spyware, even when you choose the most trustworthy one (because your point is that they don't exist), your softwares and servers are full of back doors, your internet provider and all your VPN are recording your communication, and even if you manage to get through all that, your interlocutor will not (and your interlocutor themselves is not a good guy).
But then, I'm not saying everyone is a good guy, I'm saying that if we share DIFFERENT keys, each key being different and necessary to decrypt (think of a door having several different locks needed different keys), the probability that ALL THE GUYS are bad guys is exponentially low.
If the probability of them being a bad guy or being tricked is 10%, then the probability that a 2-key system is failing is 1%, the probability that a 3-key system is failing is 0.1%, the probability that a 4-key system is failing is 0.01%, ...
> But again, that’s a conversation that matters later.
That's a fallacy. YOU are spending your time answering my comment instead of working to stop this legislation. When I check your account, I can see that you are also posting comments on "Getting 50% (SoTA) on Arc-AGI with GPT-4o" or "Show HN: Paste2Download – No Login, No Ads, Downlo..." instead of stopping this legislation.
Then, suddenly, when some people are having a deeper discussion that can help putting the rug under the feet of the bad guys, you are, incorrectly, arguing that the best strategy would be to not propose any alternative and antagonize the innocent people that are being fooled by the bad guys.
Also, these reflections on alternative approaches exists for a while (Chaum's idea is almost 10 years old). Bad legislation on the subject reappears regularly. It is time we progress instead of just pretending that we never have time for a deeper reflection, which is obviously not true.