X on Nostr: Simple answer to your thoughts is no. Signal is using mobile phone numbers as ...
Simple answer to your thoughts is no. Signal is using mobile phone numbers as account, that simply means honeypod and personal data leak, session is using generated private key like Nostr, so even if you loose phone number you have still access to your account. Session is using oxen collateralized nodes as net topology, it is using tor style hops so it keeps communication maximum private, but it has nothing with tor network data, it is not using tor topology. If you not studied math and related asymmetric cryptography, haven't been coding into crypto, not using crypto libs, or you have no specific point of fail why audited crypto libs could fail, there is nothing to speak about. But we could talk about tg, wapp and how they not encrypting data or having master keys to decrypt data.
Published at
2023-02-07 20:26:58Event JSON
{
"id": "9ba5cb86113e0db461d01fc503ac4be4109377e11855d516ce22808eda705dee",
"pubkey": "599cbcbb76c536a24001b5a5512325f260d79051a544b2579e4b34b82df62541",
"created_at": 1675801618,
"kind": 1,
"tags": [
[
"e",
"9f4cb1c0ff29913a2080bc313cd564639a983a52f4e3fb5625acb1b99e443b81"
],
[
"e",
"8d7bfec5afb60aba70ef4865b3abbcf74485ff35e9b96da4e500e7dda465933a"
],
[
"e",
"19e06d92599c5a719281fc6f7842e74f53c293fdc470ab66b4f9baa3edf6788b"
],
[
"p",
"69074169ed68fa74c37d3926359f4100635c37eea5cfece064ed022ed06f792b"
],
[
"p",
"88e9326a185488072480e0383d2968f7c2f1bc73ef7ad9999f400459afc053dc"
],
[
"p",
"599cbcbb76c536a24001b5a5512325f260d79051a544b2579e4b34b82df62541"
]
],
"content": "Simple answer to your thoughts is no. Signal is using mobile phone numbers as account, that simply means honeypod and personal data leak, session is using generated private key like Nostr, so even if you loose phone number you have still access to your account. Session is using oxen collateralized nodes as net topology, it is using tor style hops so it keeps communication maximum private, but it has nothing with tor network data, it is not using tor topology. If you not studied math and related asymmetric cryptography, haven't been coding into crypto, not using crypto libs, or you have no specific point of fail why audited crypto libs could fail, there is nothing to speak about. But we could talk about tg, wapp and how they not encrypting data or having master keys to decrypt data. ",
"sig": "2b3601789ca19c113f2508a154ebd99e32ae57c0a0753652507de0bb4ca62dca528791dcb737f6cd89f606c1292a6b9707cbff3e0d2aa020ac8da1cca8bb0410"
}