GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Friday, 22-Nov-2024 15:20:34 JST翠星石翠星石
    in reply to
    • The MILF Messiah
    • Fediverse Contractor
    • korgster
    • anemone
    • Fish of Rage
    • zonk
    • You Get Glee
    @sun @get @korgster @anemone @bot @zonk @lunarised >rsa: uncracked but they're working on it and theyre storing your data for the future
    True.
    >ecdsa: depends on the curve
    If you use NSAs selected curves, you're gone, but otherwise you're fine.
    >tor: easy to fuck up, they can unmask individuals and find hidden services one at a time with huge expenditure, unclear but currently doubt they can passively crack all traffic
    Via built-in attack defenses and redundancy like onionclouds, it can be made harder to find which computer a hidden service is running on.

    There are some monero-only VPS accessible over tor and identifying that server wouldn't necessarily identify you.

    tor just uses 3 or 6 layers of TLSv2 or TLSv3 with AES ciphers (I believe clients can be configured to accept TLSv1.1 connections, but just don't do that), which the NSA cannot crack.

    >monero: easy to fuck up
    It isn't really - there's no non-anonymous way to send a transaction.

    You're good unless you go send your view or wallet keys to the feds pretty much.
    In conversationabout 8 months ago from freesoftwareextremist.compermalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.