Avatar
calle
50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63
DM @callebtc:matrix.org

nostr:nprofile1qqs9pk20ctv9srrg9vr354p03v0rrgsqkpggh2u45va77zz4mu5p6ccpzemhxue69uhk2er9dchxummnw3ezumrpdejz7qgkwaehxw309a5xjum59ehx7um5wghxcctwvshsfmrzrk It does, how so?

We were thinking of recommending it to our contributors across nation states, but we won't if this has any truth?

idk what they're referring to

Last week, we observed a sudden spike in bitchat downloads from Indonesia during nationwide protests.

Today we're seeing an even bigger spike from Nepal during youth protests over government corruption and a social media ban.

Freedom tech is for the people. Please share. These people are using Nostr now.

Links

Official website: http://bitchat.free

iOS: https://apps.apple.com/us/app/bitchat-mesh/id6748219622

Android: https://play.google.com/store/apps/details?id=com.bitchat.droid

Let's hack electronic cash. A btc++ side event.

https://ecashhackday.github.io

what keeps us grinding 🫡

sorry to break it to you but you're already doing it and this is larping. if you're serious, delete your Blockchain. I thought so.

kinda. the receiver can always accept a partial payment but it would be... unwise. it's as atomic as any MPP.

either all go through or none. the partial HTLCs all have the same preimage.

Replying to Avatar Final

re: Apple Memory Integrity Enforcement

Pixels have provided hardware memory tagging (MTE) support since the Pixel 8. GrapheneOS deployed it in production around a month after the launch of the Pixel 8 and we use it for the kernel and nearly the entire base OS. We use it for some third party apps and users can opt-in to using it for all.

There have been multiple revisions of ARM MTE. FEAT_MTE4 (Enhanced Memory Tagging Extension) is the 4th generation of ARM MTE improvements, not the beginning of it. The baseline feature was already a game changer for defending devices. The improvements will make their way to devices providing it.

Being able to leak data via side channels is a known issue with modern CPUs with many rounds of issues being discovered and addressed. ARM has been working on fully resolving it for MTE itself. Apple CPUs have had much more severe issues with side channels than Cortex, so it's a strange jab by them.

Unlike iPhone users, #GrapheneOS users have been well protected by attacks from Cellebrite and other exploit development companies.

https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation

Apple talks a big game but consistently fails to protect their users against broadly deployed exploits used at a large scale.

ARM shipped MTE support multiple years before Apple in their Cortex cores. Yes, it was discovered to have a side channel usable by local attackers. This doesn't ruin it. MTE only has 4 bit tags which is a bigger weakness than the side channel. MTE still paves the way for stronger future features.

Apple has far more severe side channels in their hardware which leak user data. It's strange to portray leaking tags as a severe issue ruining a feature when they've consistently downplayed the impact of endless side channels vulnerabilities directly leaking sensitive user data on iPhones and Macs.

does pixel android stock also use MTE?

bitchat android 1.2.3 is out celebrating 100k downloads!

new: teleport anywhere and chat with the world using the new location picker. check it out.

https://play.google.com/store/apps/details?id=com.bitchat.droid

make sure your having fun, otherwise you won't stick around for very long

It works when Tor is off right?

Imo not an option for 99% people and you can do it already if you want

me in bitchat: "have you heard of nostr?"

user: "no"

cypherpunks write code that increases freedom. if you write code that increases freedom, you're a cypherpunk.