this post was submitted on 21 Nov 2023
162 points (91.3% liked)

Technology

57865 readers
6362 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] FaceDeer@kbin.social 0 points 9 months ago (1 children)

It doesn’t have to be a random person claiming that the first image is fake.

Then we're no longer talking about an "evil maid" attack. I'm not going to engage in further goalpost-shifting, you're just adding and removing from the scenario arbitrarily and demanding that this system must satisfy every constraint you throw at it.

If you don't want to use this system, fine, don't use it. It's not for you.

[–] BitSound@lemmy.world 2 points 9 months ago

There's no goalpost-shifting, the evil maid is still getting your keys. I'm not sure what you're not getting here.

The point is that the system is useful for exactly nobody, because you still have to trust that someone hasn't had their private keys compromised via an evil maid attack, and publishing timestamps on a blockchain is irrelevant to the problem.