deleted by creator
An open-eyed man falling into the well of weird warring state machines. I mostly speak on (offensive) cybersecurity issues.
deleted by creator
Well, the malicious actors can setup their own instances as well and exploit the inherent trust between the participants by design. P2P sold as security property in the scenario where participants are unknown and multiple in numbers is misconception. It does not square well with basic security mindfulness, and shouldn’t be taken as improvement in that regard.
I think that federation and all this stuff is not about improving security, it is a form of grassroots communication based on certain principles. If you need security, you use other tools, and treat these things as public, hostile spaces.
Such guides should probably warn that instances run by volunteers do not have dedicated security teams and that OPSEC has to be adjusted accordingly. Not that centralized services are essentially safer (they are juicier targets), but nevertheless it is still important to remember.
Thanks, Jerry!
Same same.
It’s a spam, appeared in /c/exploitdev as well.
Use Signal, use Tor, as they say.
deleted by creator