• 0 Posts
  • 9 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle






  • Some things you did not mention that caught my eye, please correct me if I misunderstood how they work:

    • No servers, just P2P. Every user doubles as a server to some degree, akin to seeding
    • Their one and only method to prevent bots is Proof of Work

    …I personally can only really see that as cons,

    • waste storage space and bandwidth on other user’s encrypted messages that have nothing to do with you
    • waste computing power every time you want to send a message to anyone
      (and I refuse to dismiss those as “negligible”, wasting any of that means wasting energy after all)

    Not to mention abuse related issues that come with the “100% Censorship resistance”, from scams and social engineering to abusive texts to illegal content to displeasing images.

    I can see an argument for some sorts of communities, but I would never consider that “a good alternative to Twitter/Facebook” in general.
    If anything, their explicit, by-design lack of moderation may make it even worse for vulnerable/sensitive groups.

    Quoting their FAQ before anyone asks for the source:

    (Security > Privacy and Data Security > Where is my data stored?)

    Your data is relayed and stored in your friends’ devices and other random devices available in the network. All data is protected by strong cryptography algorithms and can be accessed only with the owner’s secret seed.
    (Security > Underlying Technology > On what technology is WireMin built in?)
    WireMin users jointly created an open computing platform for messaging and data storage that serves each other within the network for personal communication. WireMin protects the public resource from being abused or attacked by requiring proof-of-work, or PoW, for every message sent and each bit of data stored. A tiny piece of PoW needs to be completed by computing SHA256 hundreds of thousands of times before you can send a message. Such computing tasks can be done in less than a tenth of a second which is a negligible workload for a user device sending messages at human speed. While this introduces a significant effort for an attack to send overwhelming amounts of messages or data, the actual PoW difficulty requirement of a specific message or bit of data is proportional to its size and the duration for which it is to be stored.