Avatar
Dr. Hax
d30ea98ea65e953f91ab93f6b30ea51eb33c506f87d49f600a139aef00aa9511
Cypherpunk. Infosec veteran of about 15 years (vulnerability research, exploit development and cryptography). Cypherpunks write code. :-) Signet maintainer. Self-custody your passwords... in hardware! https://hax0rbana.org/signet Want to see wider adoption so Bitcoin can be used as digital cash and not just an investment vehicle. XMR: 44RDkTFmTeSetwAprJXnfpRBNEJWKvA5dBH5ZVXA4DofgoZ9AgjyZdSa2fo7pMD3Qe3pdKga8X22y3Lyn1xYde5kPQPzVUu

Kagi's blog post on a privacy feature is not available over Tor.

https://blog.kagi.com/kagi-privacy-pass

And, to top it off, Kagi still hosts their stuff using Google. Yes, I'm sure their customers all feel very safe from Google's prying eyes and are totally fine with switching away from Google only to have their money still go to Google. πŸ™„

Kagi's help page on Tor... is not accessible over Tor. πŸ€¦β€β™‚οΈπŸ€·β€β™‚οΈ

https://help.kagi.com/kagi/getting-started/accessing-via-tor.html

Fun story: when I was migrating my #Matrix database to a new version of #Postgres, some people were still able to chat since they had accounts on other servers. My account and my server's chatrooms were down, but it wasn't complete downtime for everyone.

This is what #decentralization looks like. 😁

It'd be cool if #Amethyst allowed users to have multiple addresses to get zaps. Other clients could fall back to a secondary or roleplay l tertiary if the primary was down.

#bitcoin #lightning

That isn't to say I don't make mistakes that make it to production. I do. But in most cases people just go back to the working version and everything works just fine again.

And in cases like comms servers, where it's only useful if it's on a network (preferrably the internet), I catch things pretty fast.

Yes, I was planning on running my own relay. That's exsctly why I wanted a software architecture diagram.

For example, Alby Hub doesn't require a full bitcoin node. So where does it get it's block data? Whom would I be trusting? What signature checks are being done in Alby vs ones that would normally happen in your own full node.

Those are just some basic ones that an architecture diagram would answer. It'd also illustrate that you will depend on another server/service for your lightning address.

These diagrams are truely invaluable.

I move slowly and test things in my test environment before tewting them in production.

I may not have much, and new features may be slow, but once I get it done, it's rock solid.

Yikes. Thanks for the pointer.

I'll try to find someone who has an account with discord to grab the instructions for me. Then maybe I'll test then, write 'em up and send in a pull request.

Replying to Avatar Logen

This is one of the reasons I asked for a software architecture diagram. Alby declined and instead sent me a lightning SDK with no information of how they used it.

TFW I want to print the custom case for my #meshtastic #solar node, but I have to wait for the tentacle to finish, so I can print the brackets to make a plexiglass enclosure for my #3DPrinter so my case won't curl. Dependency chains, yo.

Either that or wait until summer when it's really warm in that room. And if I can't wait for two prints, I'm certainly not waiting until summer. πŸ˜‚

#FirstWorldProblems

Other people got a lot of the ones I was going to mention, but there's also NewPipe, Orbot, TorBrowser, Markor, Amethyst, Element, SignalFOSS, and BlueWallet.

Some of them require adding additional F-Droid repos (SignalFOSS for sure since they're blocked from the main repo, and possibly others), but they are all available via F-Droid.

Matrix. They have lots of clients for people to choose from whether they use desktop, mobile or just want to use their browser. It can have end to end encryption if you want