ab
Garlic
ab29a6df689467e282551edea0805645c66fbf3b1a27a5879997fe208a61b8b6

Asking this for Cypherpunks, can someone nowadays break SHA-1 in 30 seconds to get an TOTP code? This "supercomputers" like of IBM, Microsoft, etc. can do this?

How can I trust in apps signed by you? How I can verify that's the same signature? Your app not even (yet) has integration with AppVerifier like Accrescent

But I have a last question: Since UDP can loose packets, with 3 hops on a onion network the chances triple?

Can I use UDP over Tor? #asknostr #tor

LOLLLL PROTON SAID WILL NOT SUPPORT MONERO BECAUSE THEY DON'T WANT TO LINK WITH CRIMINALITY

Fuck layer2, monero have so low fees

I can't believe that you don't use Garnet yet ๐Ÿคจ