• 5 Posts
  • 138 Comments
Joined 3 years ago
cake
Cake day: March 20th, 2022

help-circle





  • I disagree with you however I find it attrocious than when you upgrade (exemple from ZorinOS 16 to 17) if you own a Pro licence you have to buy a new licence (with a discount) and can’t “downgrade” to non-Pro (except from reinstalling it from scratch). I think the way the Pro is sold shouldn’t put upgrade behind a paywall.

    Selling a (bloated) Pro version to bring cash isn’t necesseraly cancer it really depend on what you get and how you’re treated. And with ZorinOS I was somewhat disapointed…



  • I totaly agree with you, I am somwheat new to the fediverse, I discovered it somewhere between 2018 and 2020 and discovered nostr a few years later, I didn’t got it at first but today I understand how interesting it is to build social network or plateformes, even though that Nostr can do far more than social media.

    1. Because the admin don’t have to manage the authentification process of its users.
    2. Because users don’t rely on a central server to keep their social graphs or interact with them.
    3. Because owning some private keys makes you owning your digital identities.

    Of course the UX isn’t as great as the fediverse or not close to centralized opaque surveillance plateforme but it has rapidly improved and I had much joy discovering the bridge builded by soapbox and really want their Ditto servers project to become a thing.

    I really think that we should teach kids asymetrical cryptography at school because if we want to build a digital society we need strong encryption, true authentifications and data integrity checks. But I’m a dumb utopist…


  • I also think there’s some really valuable ideas in […] Nostr […]

    I think that too but when I brought that up to fedivers folks they always yell at me : IT’S A CRYPTOBRO PLATEFORM ! or THE FOUNDER IS RIGHT WING !

    I really do think that digital identites on p2p network thanks to asymetrical cryptography is a better design that accounts tied to a central server. I am glad that I am not alone and will follow your project closely (I will try to at least). Interesting read thank you !






  • End-to-end encryption have been designed so that a “middleman” such as Signal can’t read your conversation. Signal goes even further by encrypting metadata protecting other information such as who you’re talking too and at what time (some technical and targeted attack could however determined these).

    In asymetrical cryptography we tend to assume that what we call middleman is a third-party placed between the two peers during the public key exchanges (such as handshake). Signal is indeed a middleman on the infrastructure level but the software has been designed to protect you from middlemen having access to the raw, unencrypted data.

    That say if you don’t verify your peer’s public key it’s not impossible that someone has done a man-in-the-middle attack and that you’re sending message to him and he’s rerouting them to your peer, etc… However this is unrealistic for the average person.

    So even if it’s not a p2p infrastructure but some centralized servers we can assume that there is no middleman thanks to e2ee.