redacted

redacted

    2 Operate
    SternCat updated this article at 2025-05-09 20:46:41
    SternCat updated this article at 2025-04-10 07:37:59
    6 Reply

    Welcome to here!

    Here we can learn from each other how to use SiYuan, give feedback and suggestions, and build SiYuan together.

    Signup About
    Please input reply content ...
    • 88250 2 3 Up

      Hello, I suggest you look at the place where the encryption function is called, and you will find that it is not an end-to-end encryption key.

      The implementation of end-to-end encryption is here, the implementation of key initialization is here.

      Real open source products are trustworthy, even if they are "Made in China" :)

    • MiscReply
    • SternCat 1 via Linux
      VIP Warrior Author

      I reviewed the code and it seems you proved me wrong in my initial assessment. Good job

    • SternCat 1 Comment via Linux
      VIP Warrior Author

      It's so bad it feels like a backdoor... in a Chinese product?!?! No way that would never happen :P

      1 Reply
      You don't understand the code logic yourself but just blurt out nonsense. Pretending to know when you don't and throwing around accusations is extremely ridiculous. First, you should brush up on your knowledge.
      congsec
    • kxra via Linux

      Do you just cry social justice warrior to ignore double standards and the fact that you couldn't even understand the code you looked at?

      Anyways, Matrix is a protocol with many implementations, and the spec is improving to address those issues, so I'm not sure what your point is unless you think there is a better distributed graph database synchronization protocol.

    • Visit all replies