Replying to Avatar Ron Stoner

The next steps to “weaponize” DM metadata sniffing would be for an actor to take the data and dump it into a database to perform graph relationship mapping and track user meta updates over time to track historical changes per key over time. See who knows who and likes to talk. Do they send short messages or long ones? Can we interpret anything based on the encrypted length - padding?

DMs are the same as someone seeing you in public having dinner with someone else. They may not be able to hear the conversation, but they know that you met. The best course of action is to use burner or pseudo anonymous keys if you need to communicate privately over DM. The next layer of protection would be to obfuscate your IP via VPN to prevent capture from the relay/an image in the DM/etc.

Monitoring tools + relays = intelligence feed. We can do better. We will do better.

note1qt9fejcyvp6xjxzqghskd4ase5999x0yjwxgauvswawsf9jgze3q93mvew

Avatar
doot 2y ago

praying for nostr:npub1exv22uulqnmlluszc4yk92jhs2e5ajcs6mu3t00a6avzjcalj9csm7d828 to overtake nip04 in clients soon

Reply to this note

Please Login to reply.

Discussion

No replies yet.