• 0 Posts
  • 44 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle

  • drspod@lemmy.mltoOpen Source@lemmy.mlIntroducing Lemvotes
    link
    fedilink
    arrow-up
    48
    arrow-down
    8
    ·
    1 day ago

    I will describe how it works and the ethics of such a tool.

    Where in this post do you describe the ethics of such a tool?

    non-technical users believe that their votes are private, which is far from the truth. This attitude could potentially lead to harassment of Lemmings (yes, that’s what we Lemmy users call ourselves) for upvoting a particular post. Lemvotes makes it clear that votes are not private, which could help bring a more accurate picture of the way votes work on Lemmy to its users.

    This is what needs discussion. It is this tool which will lead to harassment due to the way someone votes. And the threat or spectre of harassment will lead to the Chilling Effect, ie. self-censorship (of voting) to avoid harassment.

    The chilling effect this causes will make communities even more like echo-chambers, as dissent will be pre-emptively squashed.

    Without a tool like this existing, people have to go out of their way to find out this information (setting up their own instance, or finding someone who already does this surreptitiously). By making such a tool available to the lemmy community at large, you make it extremely easy for anyone to do this, and so the chance of harassment occurring is much higher.

    You might think you’re being clever, or on some kind of crusade to educate the uneducated. But actually your actions are making this (community-built) platform worse. Compare your actions to releasing a 0-day exploit for a security vulnerability instead of responsibly disclosing. It doesn’t help, it just causes chaos until the people who do the actual work can figure out a solution.

    Think about how your tool existing now changes the dynamic of Lemmy as a whole. Is it better, or worse? How would you actually solve this problem in Lemmy, instead of exploiting it?








  • drspod@lemmy.mltoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    5 days ago

    What a misleading headline. “You’ll probably be protected,” makes it sound like the method is mostly working, so don’t worry about it. But that’s not what the article is about at all.

    It should be titled, “You’ll be protected probabilistically, and most data-collectors are not telling you what the probability parameter is that they are using.” The study shows that users can only make good and informed choices about their data when presented with this parameter, and an explanation of its meaning.


  • One of the few mail providers to integrate OpenPGP and also support custom domains.

    You can have them encrypt your mail with your public key as soon as it arrives, so that your mailbox is always encrypted.

    If you trust them to store your private key, you can use their web interface to decrypt your messages in the browser. Or you can have complete custody of your own keys and use your own external mail client.

    You can also turn off mailbox encryption (the default) and just use it as a regular mail provider.