redacted

This post was last updated for 210 days ago, and the information may already be changed

redacted

    2 Operate
    SternCat updated this article at 2025-05-09 20:46:41
    SternCat updated this article at 2025-04-10 07:37:59
    6 Reply

    Welcome to here!

    Here we can learn from each other how to use SiYuan, give feedback and suggestions, and build SiYuan together.

    Signup About
    Please input reply content ...
    • SternCat 1
      VIP Warrior Author

      I reviewed the code and it seems you proved me wrong in my initial assessment. Good job

    • MiscReply
    • kxra
      VIP Warrior

      Do you just cry social justice warrior to ignore double standards and the fact that you couldn't even understand the code you looked at?

      Anyways, Matrix is a protocol with many implementations, and the spec is improving to address those issues, so I'm not sure what your point is unless you think there is a better distributed graph database synchronization protocol.

    • SternCat
      VIP Warrior Author

      Matrix is not at all privacy focused, it leaks metadata, has state resolution issues, and is a metadata disaster.

      Instead of complaining about the various phobias like a social justice warrior, you could spend your time auditing the code.

      1 Reply
    • 88250 2 3 Up

      Hello, I suggest you look at the place where the encryption function is called, and you will find that it is not an end-to-end encryption key.

      The implementation of end-to-end encryption is here, the implementation of key initialization is here.

      Real open source products are trustworthy, even if they are "Made in China" :)

    • Visit all replies