🍹Early to RISA 🧉@sh.itjust.worksM to Greentext@sh.itjust.works · 22 days agoAnon is investigatedsh.itjust.worksimagemessage-square28fedilinkarrow-up1689arrow-down15
arrow-up1684arrow-down1imageAnon is investigatedsh.itjust.works🍹Early to RISA 🧉@sh.itjust.worksM to Greentext@sh.itjust.works · 22 days agomessage-square28fedilink
minus-squareHonytawk@lemmy.ziplinkfedilinkEnglisharrow-up94·22 days agoI bet they would just ask their ISP and track all their internet traffic from a comfortable bureau somewhere. This feels like the XKCD comic:
minus-squareInnerScientist@lemmy.worldlinkfedilinkarrow-up14·21 days agoYou can still create a system in which not even you know the password if the right conditions are met. Like, you didn’t authenticate in 3 days, the master encryption key is now overwritten and noone can decrypt it. Though this would be a very unstable system, a slight mistake and you have to start over, having lost all data.
I bet they would just ask their ISP and track all their internet traffic from a comfortable bureau somewhere.
This feels like the XKCD comic:
You can still create a system in which not even you know the password if the right conditions are met.
Like, you didn’t authenticate in 3 days, the master encryption key is now overwritten and noone can decrypt it.
Though this would be a very unstable system, a slight mistake and you have to start over, having lost all data.