redacted

redacted

    2 Operate
    SternCat updated this article at 2025-05-09 20:46:41
    SternCat updated this article at 2025-04-10 07:37:59
    6 Reply

    Welcome to here!

    Here we can learn from each other how to use SiYuan, give feedback and suggestions, and build SiYuan together.

    Signup About
    Please input reply content ...
    • 88250 2 3 Up

      Hello, I suggest you look at the place where the encryption function is called, and you will find that it is not an end-to-end encryption key.

      The implementation of end-to-end encryption is here, the implementation of key initialization is here.

      Real open source products are trustworthy, even if they are "Made in China" :)

    • MiscReply
    • SternCat 1 Comment via Linux
      VIP Warrior Author

      It's so bad it feels like a backdoor... in a Chinese product?!?! No way that would never happen :P

      1 Reply
      You don't understand the code logic yourself but just blurt out nonsense. Pretending to know when you don't and throwing around accusations is extremely ridiculous. First, you should brush up on your knowledge.
      congsec
    • SternCat via Linux
      VIP Warrior Author

      Matrix is not at all privacy focused, it leaks metadata, has state resolution issues, and is a metadata disaster.

      Instead of complaining about the various phobias like a social justice warrior, you could spend your time auditing the code.

      1 Reply
    • SternCat 1 via Linux
      VIP Warrior Author

      I reviewed the code and it seems you proved me wrong in my initial assessment. Good job

    • Visit all replies