traaaaaaannnnnnnnnns
Welcome to /c/traaaaaaannnnnnnnnns, an anti-capitalist meme community for transgender and gender diverse people.
-
Please follow the Hexbear Code of Conduct
-
Selfies are not permitted for the personal safety of users.
-
No personal identifying information may be posted or commented.
-
Stay on topic (trans/gender stuff).
-
Bring a trans friend!
-
Any image post that gets 200 upvotes with "banner" or "rule 6" in the title becomes the new banner.
-
Posts about dysphoria/trauma/transphobia should be NSFW tagged for community health purposes.
-
When made outside of NSFW tagged posts, comments about dysphoria/traumatic/transphobic material should be spoiler tagged.
-
Arguing in favor of transmedicalism is unacceptable. This is an inclusive and intersectional community.
-
While this is mostly a meme community, we allow most trans related posts as we grow the trans community on the fediverse.
If you need your neopronouns added to the list, please contact the site admins.
Remember to report rulebreaking posts, don't assume someone else has already done it!
Matrix Group Chat:
Suggested Matrix Client: Cinny
https://rentry.co/tracha (Includes rules and invite link)
WEBRINGS:
๐ณ๏ธโโง๏ธ Transmasculine Pride Ring ๐ณ๏ธโโง๏ธ
โฌ ๏ธ Left ๐ณ๏ธโโง๏ธ๐ณ๏ธโ๐ Be Crime Do Gay Webring ๐ณ๏ธโโง๏ธ๐ณ๏ธโ๐ Right โก๏ธ
view the rest of the comments
Read the section on NSL's (national security letters) in the link above. Any US domiciled company must give up it's data when asked, and it's illegal for them to tell their users they were forced to do so. The Obama regime admitted to issuing 60 of these every single day, there's no way Signal isn't compromised.
Matrix doesn't need to be hosted in the US, so they don't have that problem. Using any US-hosted service is a big no-no.
This is neither new information, nor something overlooked in the design of the software. Thats the point of end to end encryption and open source code: they can only give the data that they have access to, which is the sender, receiver, and timestamps, but we know they cannot decrypt messages in the middle, because it would show in the security implementation in the source code. This model prevents the carrier from knowing the contents of any messages they carry. Therefore, you have to attack one of the end point devices to get the contents, and all the warrants and secret letters in the world can't compell then to give up the content of your messages, because they do not have the means to do so.
There are legitimate problems with the security model, like its use of phone numbers as account identifiers, that render it a poor choice for doing Certain Things, but that alone does not prove it was designed as a honeypot, or that it has been secretly compromised in some way that can't be seen in the source code.