

I’m carrying on multiple conversations in this thread, so I’ll just copy what I said in a different thread:
Of course people like these features, these algorithms are literally trained to maximize how likable their recommendations are.
It’s like how people like heroin because it perfectly fits our opioid receptors. The problem is that you can’t simply trust that the person giving you heroin will always have your best interests in mind.
I understand that the vast majority of people are simply going to follow the herd and use the thing that is most like Twitter, recommendation feed and all. However, I also believe that it is a bad decision on their part and that the companies that are intaking all of these people into their alternative social networks are just going to be part of the problem in the future.
We, as the people who are actively thinking about this topic (as opposed to the people just moving to the blue Twitter because it’s the current popular meme in the algorithm), should be considering the difference between good recommendation algorithm use and abusive use.
Having social media be controlled by private entities which use black box recommendation algorithms should be seen as unacceptable, even if people like it. Bluesky’s user growth is fundamentally due to people recognizing that Twitter’s systems are being used to push content that they disagree with. Except they’re simply moving to another private social media network that’s one sale away from being the next X.
It’d be like living under a dictatorship and deciding that you’ve had enough so you’re going to move to the dictatorship next door. It may be a short-term improvement, but it doesn’t quite address the fundamental problem that you’re choosing to live in a dictatorship.
If they were leaking there would be prosecutors using the evidence in court, on the public record.
It doesn’t matter what infrastructure that they use because the service provides end to end encryption. This remains secure even if a third party is able to record all of the traffic between the two devices.
Has there ever been a single instance where a Signal client had a RCE exploit? Of all of the software on your phone likely to be exploited, signal is low on the list (your browser is where they get you).
Enshittification is a reason to leave, speculation about maybe possible enshittification in the future is not.