• 0 Posts
  • 15 Comments
Joined 6 years ago
cake
Cake day: April 17th, 2019

help-circle


  • But they don’t have to know who the message comes from, hence why the sealed sender technique works.

    Anyone who’s worked with centralized databases can tell you that even if they did add something like that, with message timestamps, it’d be trivial to find the real sender of a message. You have no proof that they even use that, because the server is centralized, and closed source. Again, if their response is “just trust us”, then its not secure.




  • They have your phone number (meaning your full identity, and even current address), and as the primary identifier, it means they have message timestamps and social graphs.

    Its impossible to verify what code their server is running. Or that they delete their logs, because they say they do? You should never rely on someone saying “just trust us”. Truly secure systems have much harder verifiability tests to pass.









  • Torrents are made for static, unchanging data. They would not make a good basis for any communication platform, where mutability is necessary.

    Also individual, tiny-torrents don’t scale up that well. Its an impressive torrent client that can handle more than a few thousand torrents. That’s about a single days worth of lemmy comments.

    Reliance on domain names, database performance, storage, and probably a few other things are the main reasons why we can’t scale a typical fediverse server (like lemmy or mastodon), and have it run on a smartphone.