diff --git a/blog/untrusted-the-issue-with-decentralisation.html b/blog/untrusted-the-issue-with-decentralisation.html new file mode 100644 index 0000000..1252fe2 --- /dev/null +++ b/blog/untrusted-the-issue-with-decentralisation.html @@ -0,0 +1,129 @@ + + +
+Posted: 2022-06-29 (UTC+00:00)
+Updated: 2022-06-29 (UTC+00:00)
+A recent trend is seeing people move towards decentralised services and
+platforms. While this is reasonable and I can understand why they are doing
+such a thing, they are seemingly doing it without thinking about the
+possible consequences of doing so. The issue with decentralisation is
+trust; there is no way to pin a key to a specific person, to ensure that
+you are communicating with the same person you are supposed to be
+communicating with. In this article, I will discuss some of the security
+issues with the decentralised model.
When it comes to messaging your contacts on a centralised platform,
+such as Twitter or Facebook, the keys are pinned to that user account,
+using the user's password as the method of identification. This approach
+makes it impossible to log in as a specific user without their password,
+should it be strong enough to not be guessed, whether via personal guessing
+or exhaustive search. The trust in this centralised model is the high
+security these platforms have. It is extremely unlikely that anyone other
+than a government would be able to access the accounts stored on such
+platforms' servers, which makes the physical security trusted. As for
+remote security, should a user's password be compromised, it can typically
+be reset if the user can prove they are the owner of the account via some
+form of identification; this is where the trust issue of decentralisation
+occurs.
I'll cut to the chase; there isn't a definitive solution. The best way
+to handle this situation is to design your threat model and think about
+your reasoning for avoiding centralised platforms. Is it lack of trust of
+a specific company? Is it the possibility of centralised platforms going
+offline? Only by thinking logically and tactically can you solve both the
+issue of centralisation and decentralisation. Often, one size fits all is
+never the correct approach, nor does it typically work.
Do not demand anonymity; demand privacy and control of your own data.
+It is possible for someone else to hold your keys, without them taking
+control of them and dictating what you can and cannot do (Twitter's
+misinformation policy comes to mind). If a platform is not listening to
+your or other people's concerns about how it is run, show those platforms
+that you will not stand for it, and move to a different one. This may not
+be ideal, but it's not different to moving from one decentralised platform
+to another. Centralisation isn't what is evil, the people in control of the
+platforms are what is potentially evil. Carefully, logically, and
+tactically, choose who to trust. Decentralisation doesn't do much for trust
+when you must still trust the operator of the decentralised platform, and
+are still subject to the possibly draconian policies of that decentralised
+platform. If government is what you are trying to avoid, there is no
+denying it is feasibly impossible to avoid it; a government could always
+take down the decentralised platform, forcing you to move to another,
+and they could also take down the centralised key storage site mentioned
+earlier in this article. A government is not something you can so easily
+avoid. Decentralisation does not solve the government issue. In order to
+live a happy, fun, and fulfilled life, while protecting yourself against
+logical threats, there are only two words you must live by: Threat model.