Hello Nostr, Yo Bluesky 2 最先端分散型SNSの愉快な仲間たち | 四谷ラボ BOOKS books.428lab.net/book/003/

Thread

npub1ktw5qzt
7/2023

“End to End Encryption” is just marketing without having significant and deliberate tampering detection mechanism. Examples include secretly swapping out a certificate/key for an identity to middlemen, private key leakage, changes in code to specific safety checks or tampering protection mechanisms, or changes in forward secrecy pre-generated keys, etc. It would be nice if we had a way to better detect these types of changes and make it very obvious to the identity. As they happen and as part of updates. It would be nose to have a trusted host OS that could help validate.

@undefined
7/21/2023, 12:37:32 PM
0
0
-