• asdfasdfasdf@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      5 months ago

      If it’s with asymmetric encryption, wouldn’t it be possible for the report button to generate a key based on their private key which can only be used to decrypt the given message?

      • nondescripthandle@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        Sounds like you know more about encryption than I do, I would hope they can do that but I still think a full off switch for users would be wise though.

        • dracs@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          Yeah, end to end encryption means its not possible for someone to intercept the message between person A and person B. Nothing stops person B then forwarding the message to person C to report it.

          • nondescripthandle@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            5 months ago

            Yeah as long as theres an (practically) unfalsifiable way to forward the message that sounds very useful, which sounds like there is based on the response to my first comment.

            • dracs@programming.dev
              link
              fedilink
              English
              arrow-up
              1
              ·
              5 months ago

              Typically end to end encryption includes digital signing of the message so you can verify who the sender was.

  • dafo@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    “Encrypted DMs”

    isn’t that just a longer way of saying “PM”?

    • Asudox@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      PMs today aren’t really private as in E2EE. They’re private as in only you, the receiver and the “trust me bro” company can see them. In special data breach cases, the attacker as well.