Ron Stoner on Nostr: The next steps to “weaponize” DM metadata sniffing would be for an actor to take ...
The next steps to “weaponize” DM metadata sniffing would be for an actor to take the data and dump it into a database to perform graph relationship mapping and track user meta updates over time to track historical changes per key over time. See who knows who and likes to talk. Do they send short messages or long ones? Can we interpret anything based on the encrypted length - padding?
DMs are the same as someone seeing you in public having dinner with someone else. They may not be able to hear the conversation, but they know that you met. The best course of action is to use burner or pseudo anonymous keys if you need to communicate privately over DM. The next layer of protection would be to obfuscate your IP via VPN to prevent capture from the relay/an image in the DM/etc.
Monitoring tools + relays = intelligence feed. We can do better. We will do better.
note1qt9fejcyvp6xjxzqghskd4ase5999x0yjwxgauvswawsf9jgze3q93mvew
Published at
2023-07-14 14:29:09Event JSON
{
"id": "a19a3b9090c08c4649b1e0502f93212e68dcc4cc18e996517b4f378c31003394",
"pubkey": "0497384b57b43c107a778870462901bf68e0e8583b32e2816563543c059784a4",
"created_at": 1689344949,
"kind": 1,
"tags": [],
"content": "The next steps to “weaponize” DM metadata sniffing would be for an actor to take the data and dump it into a database to perform graph relationship mapping and track user meta updates over time to track historical changes per key over time. See who knows who and likes to talk. Do they send short messages or long ones? Can we interpret anything based on the encrypted length - padding? \n\nDMs are the same as someone seeing you in public having dinner with someone else. They may not be able to hear the conversation, but they know that you met. The best course of action is to use burner or pseudo anonymous keys if you need to communicate privately over DM. The next layer of protection would be to obfuscate your IP via VPN to prevent capture from the relay/an image in the DM/etc. \n\nMonitoring tools + relays = intelligence feed. We can do better. We will do better. \n\nnote1qt9fejcyvp6xjxzqghskd4ase5999x0yjwxgauvswawsf9jgze3q93mvew",
"sig": "2b6436845b00fb0d13be63648af6f860e5d2141aeda8cc4b96ab6e6b7d1e7bc25334be1dd51893ae9ae255959d1e8b2db12aabb2b5d17f8db1ad9448916a1f2d"
}