0101100101

joined 5 months ago
MODERATOR OF
[–] 0101100101@programming.dev 1 points 1 month ago (3 children)

But like TOR, can entry / exit nodes be used to tie the two ends together through e.g. timing attacks?

[–] 0101100101@programming.dev 1 points 1 month ago

I sure it's possible if an African/Hawaii resident/American person can.

Mr Blobby has no nationality though.

[–] 0101100101@programming.dev 6 points 1 month ago (1 children)

Mr Blobby wouldn't take any shit.

Did you know Noel Edmonds believe(d?) that cancer can be cured by positive thoughts?

[–] 0101100101@programming.dev -2 points 1 month ago (3 children)

Phone numbers are one way. Paid accounts are another.

Rubbish. How would this stop bots? Bots are created to make money. What makes you think creators don't have a phone number, or be prepared to pay to spam.

[–] 0101100101@programming.dev -5 points 1 month ago (3 children)

huh? so the phone number is encrypted in a way that can't be read, so an sms is sent to the phone? ... a separate company sends the text on behalf of signal? so that separate company logs the phone number, the timestamp and who knows what else.

[–] 0101100101@programming.dev -1 points 1 month ago* (last edited 1 month ago)

This is what the UK police do with WhatsApp data. Even though they can't read the messages, they do use the connections of messages to suspicious characters as evidence including date and times, which also puts these other people in the spotlight, opening further investigations.

The UK police can also use 'stinger' devices that are "fake" mobile data towers to intercept mobile communications.

[–] 0101100101@programming.dev -2 points 1 month ago (1 children)

opening the discussion again is just tiring.

so tiring that i opened it and read it, then typed a long response.

view more: ‹ prev next ›