Lemmy Today

1,493 readers
82 users here now

Welcome to lemmy.today!

About us

๐Ÿค— Thanks for joining our little instance here, located in Oregon. The idea is to have a fast, stable instance and allow users to subscribe to whatever content they want from here.

๐Ÿ˜Ž We dont block any other instances. We will keep it that way unless it becomes a moderation problem.

๐Ÿค  We will be around for a very long time, so you dont have to worry about us shutting down the instance anytime soon. We like performance and stability in our servers, and will upgrade the instance when its needed.

๐Ÿฅน Make sure to join a lot of remote communities to get a good feed going. How to do that is explained here.

Lemmy mobile apps

You should start using one of these ASAP since the web browser user interface is quite ugly, even with themes.

Optional Lemmy web browser user interfaces

Rules

Contact the admin

founded 1 year ago
ADMINS
1
3
submitted 1 year ago* (last edited 1 year ago) by 1984 to c/technology
 
 

This is pretty cool and one of the top comments on Hacker News describes it the best:

It's easier to understand this if you look at the onion protocol. Broadly, it introduces noise between all users on the network by constantly sending and receiving random bytes to and from each node. This prevents external listeners from figuring out where the main server is. Originally designed to protect naval command ships, it was later used for the "dark web". If you don't know which node is the server, you can't shut it down, or read data off of it. Simplex does something similar. A connects to B. B connects to C. And A and C connect. They all chat. but there is no way to know A, B, or C, because from the outside, it all looks like: X connects to Y, X connects to Y, X connects to Y. So who spoke to whom? This is great. Even if "the authorities" demand access to chat logs, first, they won't know what to ask for. Chats between whom? Second, they still won't know who spoke to whom even if they have all the data. It's anonymized chats. They would have to sift through all of it. It still won't prevent someone invading privacy if they have physical access to your device, since the identities are stored locally for your usage convenience.

Hacker News discussion: https://news.ycombinator.com/item?id=37105477

view more: next โ€บ