Like the worst thing you could possibly choose when it comes to verification.
Could you suggest alternative verification methods?
Like the worst thing you could possibly choose when it comes to verification.
Could you suggest alternative verification methods?
Providing you trust Intel SGX (and AWS for giving them access to actual SGX and not just emulating a compromised instruction set)
😃
conspiracy begins…


https://signal.org/blog/private-contact-discovery/
Since the enclave attests to the software that’s running remotely, and since the remote server and OS have no visibility into the enclave, the service learns nothing about the contents of the client request. It’s almost as if the client is executing the query locally on the client device.
Don’t let the perfect be the enemy of the good. Signal is easy to use, and that is what really protects millions of people. Otherwise, they would never use a complex or decentralized alternative.
The actual quote is: “Perfect is the enemy of good enough.”
Source?


The only data they store are account creation time and last connection time.


Great for newcomers, especially in restricted regions.


Can someone explain how they do this verification?


“Protect Children” !


that’s a good starting point!


But there weren’t that many bugs.


Microsoft should start scratch


I think this made the allegations correct


I think so the good thing is we have full backup at dot gratis and in EXT


“shadow charities” ❤️
Why not just use cURL?
FMHY is great not just for piracy but for anything online, and it’s really well maintained.
looks cool