brito on Nostr: You're missing the point: SimpleX is easy to break by governments. Think for a bit: ...
You're missing the point: SimpleX is easy to break by governments.
Think for a bit: there is only one realistic way to use SimpleX for normal users and that is through the official app by the original author.
99.9% of those users will open channels on the same servers hosted by the original author.
The original author has received VC funding, large part of it by personalities with a track record of government cooperation. VC-funded companies need to provide return to stockholders, governments tend to pay for access into those apps (e.g. Signal received +30 million per year from the CIA until recently).
Now go back to the first paragraphs: you are using the author app and servers. It is simple to give you a spoofed version of the client app that makes you write in plain text or share those text with some federal agency. It is standard practice to give modified apps to PoI targets like you, and you won't really find the difference.
You should NEVER make it so easy and use the author app nor servers for that exact reason. That is why NOSTR is great, has hundreds of volunteer relays that make difficult to track incoming messages and dozens of different clients to retrieve them that are E2EE without cryptographic doubt.
From an adversarial point of view, NOSTR is 100x more secure than SimpleX. This is obvious to anyone working on that kind of industry.
Published at
2024-10-22 20:35:03Event JSON
{
"id": "43e6b6db9004879b72ad60c40a3f9646842fdb5ec03a47e0328558da8a8649f6",
"pubkey": "ba5115c37b0f911e530ed6c487ccbd9b737da33fd4b88a9f590860378c06af62",
"created_at": 1729629303,
"kind": 1,
"tags": [
[
"e",
"2010dd46b4beebc68f7972134d8780ce996c0ba0745dfb33fb648fc924eb9053",
"",
"root"
],
[
"e",
"91de8f48c5c8848db91bd3fadcec2b67cbf7b86bc706bf1fe9f6edd9c9993864",
"",
"reply"
],
[
"p",
"ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa"
],
[
"p",
"5c8a576582b8aba3793f2abc5f2a52c1325a900a0a94be0f1cbcc70f4fc5edee"
]
],
"content": "You're missing the point: SimpleX is easy to break by governments.\n\nThink for a bit: there is only one realistic way to use SimpleX for normal users and that is through the official app by the original author.\n\n99.9% of those users will open channels on the same servers hosted by the original author.\n\nThe original author has received VC funding, large part of it by personalities with a track record of government cooperation. VC-funded companies need to provide return to stockholders, governments tend to pay for access into those apps (e.g. Signal received +30 million per year from the CIA until recently).\n\nNow go back to the first paragraphs: you are using the author app and servers. It is simple to give you a spoofed version of the client app that makes you write in plain text or share those text with some federal agency. It is standard practice to give modified apps to PoI targets like you, and you won't really find the difference.\n\n\nYou should NEVER make it so easy and use the author app nor servers for that exact reason. That is why NOSTR is great, has hundreds of volunteer relays that make difficult to track incoming messages and dozens of different clients to retrieve them that are E2EE without cryptographic doubt.\n\nFrom an adversarial point of view, NOSTR is 100x more secure than SimpleX. This is obvious to anyone working on that kind of industry.\n",
"sig": "27f7b5d2876f02ab2d464ce47bf744ed1a74f5cd558dd2c2238c2dce4c2bb134956e3b2b0ae593ae5b3b79a1fa790491a56a0831bffad73010e2db79b3f912c8"
}