Braydon Fuller's avatar
Braydon Fuller
_@braydon.com
npub1r0ul...zzyc
"Do not give in to evil, but proceed ever more boldly against it." —Motto of Ludwig von Mises
It's wild to see folks on GH claiming Nostr isn't a censorship resistant protocol! If it's not, what is the point of any of this!? 🤦‍♂️ I think we need a GH replacement sooner rather than later.
When is the last time Telegram client code has had a security audit? Taking a quick look and two things stand out; committed binary library files and huge commits very much lacking commit notes and details, just version bumps. Binary files could be deterministically built and compared to known hashes. Commits could include notes about the changes in smaller increments. It appears that many changes are made in private and then only pushed live at each release, lots of opportunity for underhanded coding.
@PABLOF7z @Vitor Pamplona @fiatjaf I am taking a look at designing the UX for how clients can handle a compromised key gracefully; this includes key revocation, migration and deletion. These are the proposals that I found that are related, are there any others that I should know?
Finally switched to use Obtainium to install Amethyst. 💪