Providing you trust Intel SGX (and AWS for giving them access to actual SGX and not just emulating a compromised instruction set)
😃
conspiracy begins…
Providing you trust Intel SGX (and AWS for giving them access to actual SGX and not just emulating a compromised instruction set)
😃
conspiracy begins…


https://signal.org/blog/private-contact-discovery/
Since the enclave attests to the software that’s running remotely, and since the remote server and OS have no visibility into the enclave, the service learns nothing about the contents of the client request. It’s almost as if the client is executing the query locally on the client device.
Don’t let the perfect be the enemy of the good. Signal is easy to use, and that is what really protects millions of people. Otherwise, they would never use a complex or decentralized alternative.
The actual quote is: “Perfect is the enemy of good enough.”
Source?


The only data they store are account creation time and last connection time.


Can you access any settings page like accessibility?


Great for newcomers, especially in restricted regions.


Can someone explain how they do this verification?


“Protect Children” !


that’s a good starting point!


But there weren’t that many bugs.


Microsoft should start scratch


If you really care about privacy maybe try an Android with a private cusrom ROM


Why lawmakers are so stupid at understanding technology


red flag


Dario revealed he doesn’t allow using his AI for surveillance and weapons-not because it’s unethical, but because AI isn’t good enough. He said he would gladly help with the surveillance of others and assist in automated killing with better accuracy.


Thanks for the explanation. I’d be so anxious if we can’t even trust open source.


You’re right. I researched it, and it was just changed 6 months ago by Trump, who claimed the new name “sends a message of victory”
but is still technically named the Department of Defense, as only an act of Congress can formally change the name of a federal department.
Edit: Added info
Could you suggest alternative verification methods?