As the title says I live in a surveillance state where among other things the government uses paid snitches, listening devices in your home, installs Trojans/malware in your phone and computer, even outside agents can stalk and observe you 7/24.

I may not be a target of any of this as I am didn’t commit any of the crimes required to do these (for example being involved with cannabis, or helping illegal aliens or some crimes that actually warrant this like organized crime and so forth)

However with the snitch system were convicted criminals are incentivized to incriminate others to save their own skin I am not put at ease with assurances that if you have nothing to hide that you would have nothing to fear.

I do not believe however that the surveillance state is intended to prevent terrorism or organized crime. I believe the true intention of the surveillance state is to consolidate power and nip any sort of true dissent in the bud.

So in imho if you were to call out the government on their bullshit you would stand to be victimized. Even if you are well within your rights with regards to freedom of speech/thought/assembly.

So if everything on your computer may be subject to government’s prying eyes, you’d need your own language and alphabet/writing system to at least retain the ability to keep notes and write a diary.

I would like to be able to note down my thoughts without having to fear the government can read it.

I was thinking of something like Tolkiens Elven tongue/language. I know it is a lot of work especially since it is only for internal use.

What’s your opinion on this?

  • CherenkovBlue@iusearchlinux.fyi
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    1 year ago

    Not definitively. Ancient Egyptian hyroglyphics withstood it for a while but the Rosetta Stone cracked it (also I suspect modern computing would have done so by now anyway). The Voynich Manuscript is uncracked but there is a hypothesis that it gibberish, an uncracked natural language, or a ciphertext (encrypted).

    • AnarchistsForDemocracy@lemmy.worldOP
      link
      fedilink
      arrow-up
      4
      arrow-down
      4
      ·
      1 year ago

      So there is no way of knowing, if any non-cracked language might just be gibberish.

      I am really surprised that even languages like sumerian and ancient egyptian and ancient south american languages were translated. I guess language has to follow certain rules, and these allow them to be translated.

      this in turn would mean that our own contemporary languages like english, han, hindi would be deciphered by alien invadors (I know not likely lol). In turn we would be able to decipher any alien language we might come across in the future and be it just in the form of an intercepted age old radio broadcast from a distant system.

      • PrettyFlyForAFatGuy@lemmy.ml
        link
        fedilink
        arrow-up
        10
        arrow-down
        1
        ·
        edit-2
        1 year ago

        You need some sort of reference point to translate a language. The rosetta stone allowed for linguists to get their foot in the door for ancient egyptian because the same text was written three times in ancient greek (which they already knew), ancient egyption and another one i cant remember.

        from there they were able to use what they knew to expand their understanding outwards.

        you’re better just writing in your first language and encrypting using strong encryption.

        keep in mind quantum computing is coming so you will need to use encryption designed to withstand that.

        You’ll also want to keep in mind that when you delete a file on a computer it usually isn’t destroyed, it’s just sort of de-referenced and maked as “available space” so you’ll need to ensure that your medium for writing isn’t writing unencrypted to disk at any point or at least is overwriting those sectors after use otherwise what you write could be recoverable without having to decrypt

        • Lmaydev@programming.dev
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          You also need to keep in mind that encryption is about being too complex to crack.

          As computers get faster algorithms become useless.

          Many state actors are recording encrypted communications and waiting for computers to catch up.

          So use the most over the top complex algorithms you can to extend that hypothetical time when it can be cracked.

          • PrettyFlyForAFatGuy@lemmy.ml
            link
            fedilink
            arrow-up
            3
            ·
            1 year ago

            I wonder if they’ll be able to crack those encrypted insurance dumps wikileaks used to release anytime soon. I imagine there will be some interesting revelations in them

        • AnarchistsForDemocracy@lemmy.worldOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          1 year ago

          quantum computing is coming

          I never watched GOT but this has “winter is coming” vibes I am sure gpg wont work after quantum is commonplace I need to investigate other options as per your recommendation

          • xantoxis@lemmy.world
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            edit-2
            1 year ago

            GPG has long been capable of using ciphers that don’t use polynomial methods and are therefore resistant to quantum decryption. And new ciphers are developed all the time; a ton of work is being done in the area of post-quantum encryption and those ciphers will be available to GPG when they’re tested and proven.

            (I still don’t recommend GPG to people very often; its many ongoing usability issues make it a non-starter. If you use encryption incorrectly you’re only creating the illusion of security, which is worse than having none.)

              • PrettyFlyForAFatGuy@lemmy.ml
                link
                fedilink
                arrow-up
                3
                ·
                1 year ago

                you need to be careful with this. the usual workflow here is you write to a file, you then use gpg to create an encrypted version of that file, then you delete the original. the problem here is that “deleting” from an operating system often doesnt actually delete from the disk. so your unencrypted file is often wholly or partially recoverable

                • AnarchistsForDemocracy@lemmy.worldOP
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  edit-2
                  1 year ago

                  Is there maybe a way to use the ‘shortcomings’ of volatile memory to circumvent this? say somehow keeping everything in ram solely? I am not sure how this would be accomplished on a unix system though

                  • PrettyFlyForAFatGuy@lemmy.ml
                    link
                    fedilink
                    arrow-up
                    2
                    ·
                    1 year ago

                    there are programs that allow you to mount a portion of RAM as normal fs storage. you’ll have to research that though, i’ve never done it