pull down to refresh

0 sats \ 1 reply \ @LAXITIVA 21h
I wanna get naked too
reply
0 sats \ 0 replies \ @ek 13h
what stops you
reply
102 sats \ 0 replies \ @ek 14h
This dependency on the authentication service does sound pretty bad, thanks for sharing!
Does the MLS specification offer a practical mechanism for the end users to mitigate the effect of a compromised Authentication Service? No, it does not; it only refers to the approaches based on key transparency, but they are not practical in real-world applications, and, to the best of my knowledge, are not implemented in any of the communication platforms that deployed MLS.
I wonder if White Noise implemented key transparency?
reply