this post was submitted on 17 Feb 2024
21 points (78.4% liked)
Privacy
31815 readers
361 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
And you still haven't answered the question.
Define safely. We really can't help until we known what you're trying to do
I just want the telegram to not have access to the photo. Otherwise, I would use other methods to transmit it.
Theoretically, they don’t have access to the photos even though they’re running the server between. That’s what end to end encryption means, it’s encrypted on your end and decrypted on the recipients end.
Unless the middle man in question retains both your and the recipients encryption keys, they can’t read the messages. This requires trusting the vendor in question.
However the only alternative to trusting a vendor is not only purchasing your own equipment, but also deploying it on your property, and building and maintaining your own isolated physical connections between those locations. This is what nation states and militaries do, the US military has an entirely physically separate and independent “internet”.
There’s a concept in information security not to spend more protecting information than that information is worth. Your gifs are probably not worth the effort of building your own infrastructure, unless you’re sending some highly sketchy content.