Soatok Dreamseeker
- 30 Posts
- 35 Comments
Soatok Dreamseeker@pawb.socialto
Fediverse@lemmy.world•The Revolution Will Not Make the Hacker News Front PageEnglish
1·1 month agoYou’re thinking of the wrong admin lol
Soatok Dreamseeker@pawb.socialto
Fediverse@lemmy.world•The Revolution Will Not Make the Hacker News Front PageEnglish
5·2 months agoUntil the mods randomly decide to censor you, like they did with my post about tech companies disrespecting user consent.
Soatok Dreamseeker@pawb.socialto
Fediverse@lemmy.world•The Revolution Will Not Make the Hacker News Front PageEnglish
15·2 months agoOh, fair. I just remember getting a LOT of notifications from both apps. I didn’t check the exact ratio,
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Announcing Key Transparency for the Fediverse - Dhole MomentsEnglish
1·2 months agowhy it this separate mechanism needed in the first place?
Because ActivityPub was not designed for E2EE. That’s the simplest answer.
The longer, and more technical answer, is that doing the actual “Encryption” part of E2EE is relatively easy. Key management is much harder.
I initially set out to just do E2EE in 2022, but got roadblocked by the more difficult problem of “which public key does the client trust?”.
Soatok Dreamseeker@pawb.socialto
Privacy@lemmy.dbzer0.com•Announcing Key Transparency for the FediverseEnglish
1·2 months agoCertainly. Thanks <3
Soatok Dreamseeker@pawb.socialto
Privacy@lemmy.dbzer0.com•Announcing Key Transparency for the FediverseEnglish
1·2 months agoThe client side is its own beast. See https://github.com/soatok/mastodon-e2ee-specification?tab=readme-ov-file#components from my initial project (the “key transparency” thing from today slots neatly into the “Federated PKI” hole).
Soatok Dreamseeker@pawb.socialto
Privacy@lemmy.dbzer0.com•Announcing Key Transparency for the FediverseEnglish
1·2 months agoNo, if you read the post it will make more sense.
Or the specification if you’re more technical.
Soatok Dreamseeker@pawb.socialto
Privacy@lemmy.dbzer0.com•Announcing Key Transparency for the FediverseEnglish
4·2 months agoIf you want E2EE for Mastodon, you need key management to be solved first.
This solves a lot of the key management pain. It’s not v1.0 stable yet, but it’s finally implemented. I’ve been working on the spec for nearly 2 years.
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Announcing Key Transparency for the Fediverse - Dhole MomentsEnglish
15·2 months agoIt’s a building block to make E2EE possible at Fediverse scale.
I’ve written about this topic pretty extensively: https://soatok.blog/category/technology/open-source/fediverse-e2ee-project/
If you can build in Federated Key Transparency, it’s much easier to reason about “how do I know this public key actually belongs to my friend?” which in turn makes it much easier to get people onboarded with E2EE without major risks.
Soatok Dreamseeker@pawb.socialto
Technology@beehaw.org•Telegram is indistinguishable from an FSB honeypotEnglish
3·8 months agoWhich is more toxic?
The one that contains the most aggression.
Aggression isn’t toxicity. The logical consequence of your stance is negative peace, and broken stairs.
Do most of those strangers know that you are receiving hundreds of requests? They’re strangers, so I’m betting on no.
Sure they do, because I tell them. The screenshot you posted is proof that I inform them.
The rest of this is needless language policing.
Soatok Dreamseeker@pawb.socialto
Technology@beehaw.org•Telegram is indistinguishable from an FSB honeypotEnglish
3·8 months agoYou say you’re arguing in favor of less toxicity, but your example was a screenshot of a comment where I asserted my own healthy boundaries (after being needled by hundreds of demands in the form of “what about <other app>?” from strangers over the course of months).
Which is more toxic?
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Reviewing the Cryptography Used by Signal - Dhole MomentsEnglish
7·1 year agoThanks. Happy to help! <3
Soatok Dreamseeker@pawb.socialto
Privacy Guides@lemmy.one•Don’t Use Session (Signal Fork)English
6·1 year agoTL;DR from oss-security:
At a glance, what I found is the following:
- Session only uses 128 bits of entropy for Ed25519 keys. This means their ECDLP is at most 64 bits, which is pretty reasonably in the realm of possibility for nation state attackers to exploit.
- Session has an Ed25519 verification algorithm that verifies a signature for a message against a public key provided by the message. This is amateur hour.
- Session uses an X25519 public key as the symmetric key for AES-GCM as part of their encryption for onion routing.
Additional gripes about their source code were also included in the blog post.
That’s a reasonable thing to dislike about it.
I dislike that I can’t reply to another message with a sticker.
I also dislike that, despite having admin access, I can’t delete abusive messages left in groups for anyone but myself. That makes it unsuitable for building communities.
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Roasted Christmas Spam from Muhu.aiEnglish
6·1 year agoHow much can you control the conversation if the entity you are discussing only wants their name published?
It’s not about what they want published. It’s about what they don’t want published.
Sure there will be a few GDPR letters and maybe an inquiry by some regulatory body. Satisfyingly annoying to them, but compared to the cost of an advertising campaign; would this not be just a drop in the bucket.
Advertising campaigns generally don’t include OSINT on the people behind it and evidence of their crimes. How does what I published help them increase their revenue or reduce their costs? Everything is ruled by incentives.
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Roasted Christmas Spam from Muhu.aiEnglish
8·1 year agoThat sort of comment might be true if I had responded with a shallow, emotional response. Something like “how dare these outrageous motherfuckers claim to ‘roast’ my hand-crafted artisanal open source beauty with their AI slop!!”.
I didn’t do that. I sifted through the public information, assembled a profile of the people behind it, discarded the irrelevant details, and used it to describe their conduct as illegal in the country their business is incorporated in, with enough receipts for anyone else who finds their AI grift to leverage to give them immense amounts of legal and compliance pain. And then I released this all on my furry blog with the keywords that other open source developers would likely to try in a search engine if confronted with their same outrageous behavior.
Rather than let my outrage make me a useful idiot, I’ve surveyed the landscape and made sure that I’m controlling the conversation. I’m also keeping the evidence preserved, and not giving them any SEO backlink juice. This all dovetails into how bad their AI is at what it even claimed to be doing.
If any of this plays into their hands, then they’re playing chess on a dimension that the void cannot comprehend, let alone my mortal ass. But I’m willing to wager that the amount of legal anguish my blog post will create for their grift will significantly outweigh any benefit they get from the possible name recognition my blog creates.
Soatok Dreamseeker@pawb.socialOPto
Technology@lemmy.world•Roasted Christmas Spam from Muhu.aiEnglish
5·1 year agoYeah, business children is an apt description.
















No, that’s like 20% of the blog post. This was a “2025 Retrospective” blog post. I always try to give a fun title to my end-of-year blogs. 2024’s was https://soatok.blog/2024/12/18/the-better-daemons-of-our-profession/