redacted
redacted
Related articles
-
Hello, I suggest you look at the place where the encryption function is called, and you will find that it is not an end-to-end encryption key.
The implementation of end-to-end encryption is here, the implementation of key initialization is here.
Real open source products are trustworthy, even if they are "Made in China" :)
- MiscReply
-
SternCat • • 1 Comment via LinuxVIP Warrior Author
It's so bad it feels like a backdoor... in a Chinese product?!?! No way that would never happen :P
1 ReplyYou don't understand the code logic yourself but just blurt out nonsense. Pretending to know when you don't and throwing around accusations is extremely ridiculous. First, you should brush up on your knowledge.congsec • -
SternCat • via LinuxVIP Warrior Author
Matrix is not at all privacy focused, it leaks metadata, has state resolution issues, and is a metadata disaster.
Instead of complaining about the various phobias like a social justice warrior, you could spend your time auditing the code.
1 Reply -
SternCat • • 1 via LinuxVIP Warrior Author
I reviewed the code and it seems you proved me wrong in my initial assessment. Good job
- Visit all replies
Welcome to here!
Here we can learn from each other how to use SiYuan, give feedback and suggestions, and build SiYuan together.
Signup About