Avatar
BlackCoffee
683211bd155c7b764e4b99ba263a151d81209be7a566a2bb1971dc1bbd3b715e

And Signal FUD could help it stay that way. I treat WhatsApp as unencrypted.

"One explanation is the app became too popular with Western citizens for the US intelligence community’s liking"

It makes sense. There's potential for a backdoor in signal downloaded from an app store. Reproducible builds are a thing but not possible for iOS afaik. Also, remember the Pegasus is a thing. If you're really a target, having a device with a phone number is probably a bad move. For most plebs, Signal is "good enough".

This is a good watch if you're interested in how the tech behind Signal works

https://yewtu.be/watch?v=kdlzSZxMpgw

Gm. I wonder if the Signal FUD is happening because it works and people are using it.

i find that whenever i stop these sorts of diets i gorge for week following and undo everything I gained. and then some.

Eeesh. 6 months for a vulnerability patch seems crazy. Is there a reason Google are waiting so long?

I think I need to change my relays

Unless there's something in the code that limits this, there's no reason why it couldn't. I'm sure I saw an approach to a proof of reserves for a mint somewhere.

You could probably put the server behind Tor for additional privacy. Mint to relay communication would still be needed afaik understand it.

I really do think that nostr as a device comms protocol is huge, especially for firewalled networks or where you don't want to doxx your IP to the world.

Having used NDK for the first time and understanding just how easy it makes building a client; I agree. This is the power of SDKs.

haha. nope, no tunnelling required. it just sits on a home network or similar and watches a relay for NIP46 request events (connect, sign_event, nip04_encrypt etc)

the esp32 based remote nostr signer has been up constantly for 3 days now and seems to have no issues.....