redacted
redacted
Related articles
-
Hello, I suggest you look at the place where the encryption function is called, and you will find that it is not an end-to-end encryption key.
The implementation of end-to-end encryption is here, the implementation of key initialization is here.
Real open source products are trustworthy, even if they are "Made in China" :)
- MiscReply
-
SternCat • • 1 via LinuxVIP Warrior Author
I reviewed the code and it seems you proved me wrong in my initial assessment. Good job
-
SternCat • • 1 Comment via LinuxVIP Warrior Author
It's so bad it feels like a backdoor... in a Chinese product?!?! No way that would never happen :P
1 ReplyYou don't understand the code logic yourself but just blurt out nonsense. Pretending to know when you don't and throwing around accusations is extremely ridiculous. First, you should brush up on your knowledge.congsec • -
kxra • via Linux
Do you just cry social justice warrior to ignore double standards and the fact that you couldn't even understand the code you looked at?
Anyways, Matrix is a protocol with many implementations, and the spec is improving to address those issues, so I'm not sure what your point is unless you think there is a better distributed graph database synchronization protocol.
- Visit all replies
Welcome to here!
Here we can learn from each other how to use SiYuan, give feedback and suggestions, and build SiYuan together.
Signup About