UrbitDAO
@ChainWorld0
Followers
45
Following
211
Media
20
Statuses
537
We are committed to Urbit, decentralization, privacy, and Web3 to build a new internet.
Joined May 2025
This account has been maliciously frozen by X due to a malicious report. Therefore, this account will reduce its activity. Please follow our @joinmastodon account.
1
1
0
October was a defining month for Nomos, with major Bedrock upgrades, Blend Network resilience improvements, and NomosDA decentralisation gains. We also appeared at Dark Prague, sharing our vision for a more private and resilient internet. https://t.co/XaraPKU14y
blog.nomos.tech
October was a defining month for the Nomos project, marked by development and a conference appearance.
0
0
6
Garlic routing in I2P uses multiple layers of encryption per packet, unlike Tor's onion routing. Each 'garlic clove' contains multiple messages to obscure traffic patterns.
10
48
276
@SimpleXChat In summary, I2P is more decentralized than Tor and Simplex, making it more suitable as the underlying layer for instant messaging applications. This article only provides a brief overview; for more in-depth technical details, please consult someone with technical expertise.
1
0
0
@SimpleXChat 4. The platform does not appear to have undergone community review.
1
0
0
@SimpleXChat 3. This cloud server only supports one language implementation and has no third-party implementations, so its functionality is limited by the official version.
1
0
0
@SimpleXChat 2. The platform's cloud server architecture is similar to Nostr, but it does not appear to provide end-to-end encryption; the cloud server is aware of the message's sending and receiving destinations.
1
0
0
A @SimpleXChat decentralized architecture: 1. It currently has fewer than 1,000 nodes, and these nodes temporarily store user chat information; it also relies on cloud servers.
1
0
0
I2P is still small in scale, with only 30,000 nodes, but its future development prospects are bright.
1
0
0
3. I2P packages multiple messages into a single message to provide anonymity, and then uses continuously improving encryption protocols to further enhance anonymity and prevent powerful attacks.
1
0
0
Simultaneously, I2P is actively introducing hybrid quantum encryption to prevent attackers from performing pre-decryption attacks.
1
0
0
2. I2P uses two tunnels with 10-minute expiration times to transmit information. However, these tunnels expire every 10 minutes and are rebuilt with random nodes to prevent attackers from analyzing the traffic.
1
0
0
Decentralized architecture of I2P: 1. I2P allows anyone to write I2P node software in any language (currently known implementations include Java, Go, C++, and Rust), and the variety of node software implementations promotes diversity among users and developers.
1
0
0
I2P's decentralized architecture VS @SimpleXChat's decentralized architecture
1
0
0
@SimpleXChat You pivoted to tone because you lost on substance. (even that you couldn't disprove, or disagree with) Coerced consent is already invalid under GDPR. You admitted coercion exists. That means the law already covers it. Your "we need new laws" argument just died. Tor relays don't
1
1
14
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications.
privacyguides.org
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible.
1
4
32
Privacy isn't a feature. It's a right. Cake Wallet gives you everything you need: 🔐 Self-custody 🤐 Silent payments 🔄 PayJoin 📖 Open source 🧅 Native Tor This is how Bitcoin should work.
5
19
123
A new era begins! the unified Status Mobile app is here - now on the same codebase as Status Desktop what does this mean for users? ⚡faster feature rollouts 🐞less bugs 💫seamless ux between Desktop/Mobile 🧩easier to build cool stuff on try it out:
status.app
Meet the unified Status Mobile app (referred to as Status Mobile app in this article) — built from a single Status Desktop codebase to deliver a unified experience across mobile and desktop devices. ...
4
10
42
Privacy should not rely on third-party privacy nodes; instead, individuals should build their own privacy nodes.
0
0
0