Jitsi Meet abandons anonimity promise(reclaimthenet.org) |
Jitsi Meet abandons anonimity promise(reclaimthenet.org) |
I assume this move, in essence, is meant to combat spam?
Also it's only their hosted for profit service. Use the fsf instance if you feel violated by a user account. https://jitsi.member.fsf.org/
If logging in is an issue, you're still able to selfhost Jitsi just fine.
Edit: this article feels like blogspam to me. https://jitsi.org/blog/authentication-on-meet-jit-si/ is the source the article refers to.
Selfhost jitsi-meet!
It isn't rocket science: https://jitsi.github.io/handbook/docs/devops-guide/devops-gu...
https://jitsi.github.io/handbook/docs/devops-guide/devops-gu...
That's Not Good(tm).
Good thing Self-hosting still works I guess. Will have to set it up.
It doesn’t sound like Jitsi is sending Facebook and Microsoft transcriptions of your meetings so I don’t see why this is a big concern for a free service.
Slightly hypocritical reclaimthenet
Those bad actors and privacy-conscious people (both entirely distinct group, just in case it looks like I'm putting those two in the same category..) can still self-host their own Jitsi Meet server if they want to.
Why that might be is often revealed on techdirt:
- https://www.techdirt.com/edition/freespeech/
For other reasons, see also:
- https://mattfrisbie.substack.com/p/the-ugly-business-of-mone...
If you are doing P2P then you will be able to get the remote's IP address.
But the true answer is probably "all of the above".
I've never used OF but assumed they take a cut. Through Jitsi a performer could arrange for payment via crypto, protect their identity, and not pay a cut to any middle-men beyond the crypto fees. What am I missing?
is requiring Oauth from Facebook, Google or Github for hosts something meaningful, necessary or the obligation of Jitsi Meet to do at all
If they still wish to do any sort of reporting or eavesdropping on content, something they claim to be specifically impossible, yet somehow they've unearthed, that is their perogative I suppose.
Personally, I think <insert law enforcement authority> of some sort has made rumblings or threats about them daring to run an uneavesdroppable open comms service, so once again, nice things cannot be had, and everyone is happy to torch the ability to low-frictionly connect between arbitrary people because of the CSAM boogeyman, which no evidence has been brought forth to assert the existence of. In fact, there's been no evidence brought forth that there is any sort of worthwhile reason other than "Jitsi wants in on monetizing user's contact meta info".
the only people that have to identify problems and solutions are founders that are grifting for capital or customers. and that’s sad.
the rest of rational actors can see a false dilemmas from afar without knowing what the third and fourth and fifth possibilities are.
in this case its pretty obvious that “privacy for hosts, or not via FAANG Oauth and an unaccountable change in the terms of service to further distance from privacy” is a false dilemma while also not preventing anonymous CSAM rooms on their service.
Is MFA the only solution to the auth problem? No.
Is having a firewall the only way to prevent unauthorized traffic on your network? No.
Is docker the only solution to how to package software in containers? No
Is git the only DVCS? No.
Is git-flow the only way to manage branching and pull-requests? No.
Is Rust/Python/Javascript the only programming language? No.
Are relational databases the only way to persist important data? No.
etc etc etc...
We normally expect for difficult problems to have a variety of solutions with different tradeoffs and in particular, for really hard problems involving adaptive human adversaries, a lot of time we rely on applying multiple levels of "solution" in order to give us defense in depth and a chance to really crack a particular problem.
when without that rumor the criticism of the change would be criticism
“is this the only solution” is actually just me being diplomatic on a topic people are emotional about, as its clearly not the only solution, but even that is met with deflection
maybe thats the reason this “weird standard” is only noticed on CSAM mitigation discussions, because people know they cant be frank to you
3. the same signup requirements for the participants instead of just the host
4. phone number verification for the host and participants
5. a credit card for the host and participants
6. some kind of deposit for the host and participants
7. discriminating against Tor users
8. including Apple ID in the list of auth services
9. it actually not being Jitsi Meet's obligation at all and authorities continue to prosecute the criminal action of the participants by doing actual investigations
10. ...
It seems like your actual opinion is #9, but that's not actually a solution they can implement.
people pretending that the only people that can question one solution must also be the person to have the other solution
Its “is this the least worst solution, or the most best, and why?”
if you cant engage you have the same choice