For me its probably the debate regarding using a VPN with tor - Like the tor devs themselves recommend against using a VPN with tor.

Another is also probably the argument of “nothing to hide, nothing to fear”.

  • nitneroc@lemmy.one
    link
    fedilink
    arrow-up
    4
    ·
    11 months ago

    Matrix bridges have nothing to do with encryption, they read the messages exactly the same way a client would, and send them to the other side of the bridge exactly the same way a client would.

    • miss_brainfart@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      11 months ago

      They have a lot to do with encryption. As an example, Signal and Matrix use different encryption standards. So to get a message across, it needs to be decrypted mid-transit, to then be re-encrypted with the protocol of the recipient.

      Any one of your contacts can set this up without your knowledge or consent, and then there’s a gap in the encryption. They can just freely give away the keys to their chats they have with you, and now a third-party has the means to decrypt your messages.

      That’s pretty fucked if you think about it, but there’s not much you can do.

      Sure, it’s not a huge problem if the service doing it is verifiable to have good security and doesn’t snoop, but it’s still adding another link in the chain to trust and to keep intact.

      • nitneroc@lemmy.one
        link
        fedilink
        arrow-up
        2
        ·
        11 months ago

        That’s exactly what I said, each side of the bridge has its own encryption standard (or no encryption at all).

        The encryption could be as solid as possible, the problem would remain unchanged: to bridge messages between two services that are not interoperable, you need to decrypt them at some point.