• BigBenis@lemmy.world
    link
    fedilink
    arrow-up
    17
    ·
    2 days ago

    It’s almost like that party has no values and sees everything only through the lens of political leverage.

  • KingDaddy@lemm.ee
    link
    fedilink
    arrow-up
    22
    ·
    2 days ago

    Where is the accountability from the public? Every redneck 100 mi from me was screaming about her damn emails. They probably didn’t even understand why they were outraged, but the man on the FoX nEwS was angry about it so I am too. They say that the don’t trust the government for legitimate topics like vaccines, and taxes and then when the government gives you a huge reason to actually be concerned, it gets ignored

  • conditional_soup@lemm.ee
    link
    fedilink
    arrow-up
    23
    ·
    2 days ago

    I’m not sure that pointing out the hypocrisy is even useful. I’m nearing 40 and “but it’s okay when we do it” has always been a core tenant of conservatism. They don’t give a shit that they’re hypocrites, they don’t care, I’ve boxed them in on it before and it always just boils down to “it’s okay for us because I said so”. I think it’s maybe more useful to move past the identification of hypocrisy and start engaging in conversations about accountability. That is, conversations about hypocrisy without conversations about what kind of accountability you’d like to see are moot. So, let’s move past “can you believe this shit? But her emails? Do you feel like the hypocrites you are yet?” to “your boy did something fucking stupid. I don’t care about your excuses, fire him.”

    • tankfox@midwest.social
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      2 days ago

      That’s true! We just assume that by pointing out the naughty behavior Someone will Do Something because honest people expect honest reactions.

      Dishonest people cannot have honest reactions, their words mean nothing, they respond only to personal suffering and nothing else.

  • perestroika@lemm.ee
    link
    fedilink
    arrow-up
    13
    ·
    2 days ago

    Summary:

    • a journalist was invited
    • half an hour before the first takeoff, the takeoff times of planes, drones and cruise missiles were shared
    • it was mentioned that an individual terrorist is on sight and his location known

    Sadly, none of them will be jailed, like a lay person would be for disclosing military secrets.

    However, I would advocate for punishing them with having a mandatory nanny appointed to oversee them for 4 years.

  • Zerlyna@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 days ago

    Also the disappearing texts are a concern. There’s not much mention of that. And now you have to wonder, how many other conversations have been held there, and with who?

  • whodrankarnoldpalmer@startrek.website
    link
    fedilink
    English
    arrow-up
    205
    ·
    edit-2
    3 days ago

    It’s almost as if they never actually cared about the server but rather were just using it to score points. Not at all like, you know, absolutely everything else.

  • futatorius@lemm.ee
    link
    fedilink
    arrow-up
    42
    arrow-down
    3
    ·
    3 days ago

    Nothing on Hillary Clinton’s server was classified at the time it was put on the server. Some items were subsequently reclassified to the lowest level above Unclassified.

    So there’s really no comparison between the two situations. It stinks of bothsidesism for the journalist to even mention it. A better contrast is between screeching outrage at nothing, versus the current sneering complacency about a major security fuck-up, though I’m sure it pales with what Trump is sharing with Russia and what he’s waving around in front of his cronies to brag about what he knows.

  • HubertManne@piefed.social
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    1
    ·
    3 days ago

    Wasn’t the server an actual private server she had setup whereas this is a corporate app that is supposedly private if they are not lying and accessing the data. I mean this is way wore unless they put up a server to run the chat software.

      • HubertManne@piefed.social
        link
        fedilink
        English
        arrow-up
        8
        ·
        3 days ago

        I don’t think anything can be proven unless you have admin rights to the server at all times. signals are encrypted every time they are sent encrypted. can it be turned off with a flag? does it run in dev without it for troubleshooting and if so is it impossible to enable in prod.

        • icmpecho@lemmy.ml
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          1
          ·
          edit-2
          3 days ago

          okay, so self host it if that is part of your concern/threat model. the Signal server code is open to the public, you can see and download it here.

          • HubertManne@piefed.social
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            3 days ago

            exactly. if they had self hosted then it would be closer to equivalent to hilaries email but if it was using signal as written but then there is the foia issue which was still possible with hilarys email server, but not under a self hosted signal if not altered.

        • GreyBeard@lemmy.one
          link
          fedilink
          arrow-up
          2
          ·
          3 days ago

          The server can’t decrypt it if it doesn’t have the keys to do so. It can be proven that private keys never leave the local device. It can also be proven that the proper public keys are being provided, and that the local device alerts on public key changes with a partner are announced.

          Of course, nobody as part of the linked article did any of that verification, but still, a server doesn’t need to be trusted to be functional.

          • Gawdsausage@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            2 days ago

            Doesn’t matter. Signal desktop app can sync messages and be installed on compromised computers. One of the guys in the chat was in Russia visiting Putin. It would be trivial to sync the account to the app installed on compromised machines and basically become an invisible backdoor into every secure communication for that user. I have no doubt one of the users in the chat is setup like this.

            • GreyBeard@lemmy.one
              link
              fedilink
              arrow-up
              1
              ·
              2 days ago

              Oh, I’m not defending these dumb-asses doing illegal things to avoid systems setup to safeguard American and its people. They absolutely could have synced things to compromised devices. Just that Signal, themselves, couldn’t do that.

            • GreyBeard@lemmy.one
              link
              fedilink
              arrow-up
              2
              ·
              2 days ago

              In the case of signal, it is provable that it cannot. They do not hold the keys to decrypt. The closest risk is the server injecting a new public key into the conversation, which the Signal app will warn about.

                • GreyBeard@lemmy.one
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  2 days ago

                  Signal does hold the public keys for every user. But having the public key doesn’t let you decrypt anything. You need the private key to decrypt data encrypted with the public key. So in a chat example, if you and I exchange public keys, I can encrypt the message using your public key, but only you can decrypt it, using your private key.

                  Signal does run the key exchange, which means they could hand a user the wrong public key, a public key which they have the private key for, instead of the other person’s. That is a threat model for this type of communications, however, signal users can see the key thumbprints of their fellow chat participants and verify them manually. And once a chat has begun, any changes to that key alerts all parties in the chat so they know a change has happened. The new key wont have access to any previous or pending messages, only new ones after the change took place.

    • Pacattack57@lemmy.world
      link
      fedilink
      arrow-up
      14
      ·
      3 days ago

      It doesn’t matter what kind of server you’re using. Highly classified information has rules and regulations. Some stuff can only be talked about in certain buildings because the buildings were built to block listening devices.

      This is a major fuck up that could have gotten American soldiers killed. Everyone involved should be in prison.

      • Knock_Knock_Lemmy_In@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        Everyone involved should be in prison.

        I’m not sure we could prove this was knowing and willful. The Russian recipient of the messages is the most suspicious angle of attack.

        • Arcka@midwest.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 days ago

          Are you suggesting they didn’t know Signal wasn’t an approved platform for sensitive government communication and willfully used it anyway?

          • Knock_Knock_Lemmy_In@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            2 days ago

            Is approval of a communications platform legally required, or just best practice? You can guess what the Republicans will argue.

            Hillary got off for not knowingly leaking documents, so will these guys.

            • Pacattack57@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              1 day ago

              The first message may have been by mistake. Every single message after that was knowing and willful. This isn’t a message between friends. These were highly classified communications between top admin officials. They are aware of the law and policies regarding classified information and willfully engaged in communications on an unsecured platform. Any person could have stopped it after the first message.

              • Knock_Knock_Lemmy_In@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                1 day ago

                The law requires people to knowingly and willfully release confidential information.

                Just using unsecured platforms for communications is not illegal (otherwise Hillary would have been prosecuted).

    • running_ragged@lemmy.world
      link
      fedilink
      arrow-up
      19
      ·
      3 days ago

      Also, while using the app, there is zero accountability for who told who to do what within the government. FOIA is useless for any conversation happening within that app, self hosted or not.

      • bassomitron@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        ·
        3 days ago

        Yep, OPSEC is definitely a major issue here. But the other problem is like you mention, zero accountability. Additionally, if they delete the chat, there is no way to reobtain the data for historical archive purposes, which is another law violation.

  • someguy3@lemmy.world
    link
    fedilink
    arrow-up
    34
    ·
    3 days ago

    Conservative hypocrisy knows no bounds. They will only be outraged at what their talking heads tell them to be outraged at.