Comment by epa
Comment by epa 2 days ago
Government employees already have access to every text, call, and email you have ever sent. Where was your outrage since the Snowden leaks?
Comment by epa 2 days ago
Government employees already have access to every text, call, and email you have ever sent. Where was your outrage since the Snowden leaks?
Which is why I personally disagree with
>> The question isn't what's being accessed, it's who is accessing it.
It certainty is a question of what is being accessed. I don't care if it is god damn Mr Rogers with the best intentions. The more sensitive the data, the stronger roadblocks need be in place. Often to the degree of impossible to access because it shouldn't be gathered in the first place.There will always be good reasons to access data, and sensitive data. There is always good that can come out of this. But just because you can do something good with it doesn't mean you should. You can do a lot of good with a nuclear bomb, but I don't want any ever built because it takes only a small mistake (not an act of malice!) to have huge consequences. There is always a cost, you must always consider if the costs are worth the benefits.
Telegram and Signal having hundreds of millions of "regular person" users since then says different. It doesn't seem apparent because in the past decade Big Tech has dropped any pretensions around caring about privacy other than for themselves. In the past 5 years, they've deepened their role in the natsec apparatus as well.
First, if you’ve used HN at any point since the Snowden leaks there has never been a shortage of outrage here.
Second, while that was a major topic in international news for years, it did at least stay in the national security space where access is restricted. A lot of the concerns around DOGE are because they bulled through all of the normal rules for who gets access to sensitive data and how it’s handled. Say what you will about the NSA, and many here have, they didn’t just hand out credentials to inexperienced people with a history of leaking data or condone use of personal computers for government work.
This is especially of concern if the reports of write access being used to push code changes or deploy monitoring keyloggers are true: do you really want to bet that the guys who made a .gov site world-writable couldn’t be compromised by a foreign intelligence agency? There are legitimate concerns about the level of process overhead in government IT but that doesn’t make the reasons for it go away.