The reason why we as consumers get held to ransom by Big Tech is because they are the one's who create walled gardens of their apps to ensure it is very difficult to leave their service and to maintain any communication with your friends or family who stay behind. They count on that sticky network effect to hold you in place.
The world was not always like this, as we see with e-mail where any app can e-mail any other app. Neither was messaging as it was also once open.
So what we need is a protocol to be broadly supported that will connect anyone to any other app supporting that open protocol, but which allows end-to-end encryption. We need apps to support it, just like Hubzilla which built in a number of plugins to allow it to communicate with Diaspora, XMPP, Fediverse, etc all from one place.
What do we do about Big Tech like Facebook, Twitter, Google, Microsoft? Well either they must be mandated by law to build in this protocol support, or we as consumers must start voting with our choices and not make use of services that are walled gardens. Our future lies in an open interoperable Internet offering privacy. The future cannot be walled gardens separating us all.
From the link below the key columns are the License (how open is it for anyone to use without cost?) and End-To-End Encryption (can I use it privately?). From these requirements we can see that the following protocols could be suitable to consider:
* Bitmessage (Desktop P2)
* Briar (P2) but Android only
* Echo
* Jami (Desktop and Mobile P2P)
* Matrix (Desktop and Mobile Federated Client-Server)
* Ricochet (Desktop P2P)
* Signal (Centralised Desktop and Mobile)
* SIMPLE (more phones with SIP?)
* Tox (Desktop and Mobile P2P)
* XMPP (Desktop and Mobile Decentralized Client-Server)
See
Comparison of instant messaging protocols - Wikipedia#
technology #
instantmessengers #
interoprability #
bigtech #
privacyThe following is a comparison of instant messaging protocols. It contains basic general information about the protocols. Note 1: In ~usr@a.b.com, the a.b.com part is known as the "hostmask" and can either be the server being connected from or a "cloak" granted by the server administrator; a more realistic example is ~myname@myisp.example.com. The...