Admin on the slrpnk.net Lemmy instance.

He/Him or what ever you feel like.

XMPP: povoq@slrpnk.net

Avatar is an image of a baby octopus.

  • 45 Posts
  • 974 Comments
Joined 2 years ago
cake
Cake day: September 19th, 2022

help-circle







  • There is plenty of “content”, it just doesn’t get shoved in your face automatically. I personally can’t keep up with my non-Lemmy ActivityPub feed and the presenter is absolutely correct about time-zone issues in that regard. The Phanpy catch-up feature that presents your feed more like an email inbox sorted by user account helps with that though.

    That said, once you get over FOMO it is really fine and I don’t mind getting bored of it at all.








  • There is no such thing as a blind relay. There will always be meta-data accumulation at such points in the network.

    It is possible to try to minimize the meta-data accumulation and obfuscate it further and there are certainly some interesting theorectical concepts for that in systems like SimpleX, Nostr etc. but in the end most of these are just giving a false sense of security.

    In addition many of these systems engage in what I call “trust-washing”, i.e. them proudly proclaming: “there is no need to trust us, bro!” When in reality there are multiple points of failure in their pretend to be trustless system that they just chose to ignore or try to distract you from.

    And when it comes to the real-world, tried and battle tested system like Tor are where I would put my safety, not some brand new crypto-bro dondogle that is funded by venture capital investors (like SimpleX).



  • I think this is a fallacy, and anyone that is old enough to remember the popular days of Bittorrent will have stories to tell.

    Yes, in theory p2p models can be more secure if you really know what you are doing.

    But in reality the users’ end devices are often the weakest link and most people have bad opsec. A server operator has often a much better idea what they are doing and systems like Tor or xmpp that allow servers to protect their users by not sharing all the metadata with every participant are safer for the majority of users.