- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
cross-posted from: https://lemmy.ml/post/20406932
deleted by creator
Am I too harsh […]?
No. If there’s no way to verify anything then all we have to go on is their word.
The word of a company generally isn’t worth a whole lot. Same with Telegram.The clients are source available for telegram though
deleted by creator
I mean technically the client is verifiable if you use discord in a browser tab… and verify it every time you load the web page… 🙃
every time you load the web page…
You said it better than me. 🤣🤣
you aren’t. to me this is just PR
They just mean you now really have to pay to get private data. 🤣
False, this is a lie.
Discord is anti-libre software. We do not control it.
It bans us from proving its claims. It bans us from fixing its lies.
It fails to include a libre software license text file, like AGPL. Discord is malware, anti-libre.
deleted by creator
bro, just use firefox or Librewolf or something.
deleted by creator
If you believe anything you write or say on discord is private. Or would ever even be encrypted, I want whatever you’re smoking please.
Yeah, Discord is not a privacy preserving service in the slightest. Honestly I’m only using it because of the network effect at this point.
That and it has full functionality in the browser. No bullshit “download the app”.
deleted by creator
But not for text?
nah, selling messages is way easier
Hey Discord, give us the ability to stream audio when sharing our screen on Linux ffs.
Vencord/Vesktop supports audio streaming on Linux and is just a generally better experience compared against the Discord official app. Free and open source.
+1 for vesktop works great for me
No. 😡
Huh
No I’m not.
How will they comply with the US government?
They can deliver the data that they do have, which will be encrypted. Though I doubt they were ever recording calls anyway.
deleted by creator
How would the US government be able to see the messages? They need to monitor for young people leaking data from the Pentagon. /s
It’s interesting that the threat model also includes participants. They take into account that when a user leaves, it should be impossible for them to continue listening.
screams in Matrix
but why?
End to end directly to ccp