ChainWorld0 Profile Banner
UrbitDAO Profile
UrbitDAO

@ChainWorld0

Followers
45
Following
211
Media
20
Statuses
537

We are committed to Urbit, decentralization, privacy, and Web3 to build a new internet.

Joined May 2025
Don't wanna be here? Send us removal request.
@ChainWorld0
UrbitDAO
4 days
This account has been maliciously frozen by X due to a malicious report. Therefore, this account will reduce its activity. Please follow our @joinmastodon account.
1
1
0
@Nomos_tech
Nomos
1 day
October was a defining month for Nomos, with major Bedrock upgrades, Blend Network resilience improvements, and NomosDA decentralisation gains. We also appeared at Dark Prague, sharing our vision for a more private and resilient internet. https://t.co/XaraPKU14y
Tweet card summary image
blog.nomos.tech
October was a defining month for the Nomos project, marked by development and a conference appearance.
0
0
6
@DoingFedTime
Sam Bent
3 months
Garlic routing in I2P uses multiple layers of encryption per packet, unlike Tor's onion routing. Each 'garlic clove' contains multiple messages to obscure traffic patterns.
10
48
276
@ChainWorld0
UrbitDAO
10 hours
@SimpleXChat The origin of I2P:
0
0
0
@ChainWorld0
UrbitDAO
10 hours
@SimpleXChat In summary, I2P is more decentralized than Tor and Simplex, making it more suitable as the underlying layer for instant messaging applications. This article only provides a brief overview; for more in-depth technical details, please consult someone with technical expertise.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
@SimpleXChat 4. The platform does not appear to have undergone community review.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
@SimpleXChat 3. This cloud server only supports one language implementation and has no third-party implementations, so its functionality is limited by the official version.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
@SimpleXChat 2. The platform's cloud server architecture is similar to Nostr, but it does not appear to provide end-to-end encryption; the cloud server is aware of the message's sending and receiving destinations.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
A @SimpleXChat decentralized architecture: 1. It currently has fewer than 1,000 nodes, and these nodes temporarily store user chat information; it also relies on cloud servers.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
I2P is still small in scale, with only 30,000 nodes, but its future development prospects are bright.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
3. I2P packages multiple messages into a single message to provide anonymity, and then uses continuously improving encryption protocols to further enhance anonymity and prevent powerful attacks.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
Second point to add: The tunnel will be encrypted by default.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
Simultaneously, I2P is actively introducing hybrid quantum encryption to prevent attackers from performing pre-decryption attacks.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
2. I2P uses two tunnels with 10-minute expiration times to transmit information. However, these tunnels expire every 10 minutes and are rebuilt with random nodes to prevent attackers from analyzing the traffic.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
Decentralized architecture of I2P: 1. I2P allows anyone to write I2P node software in any language (currently known implementations include Java, Go, C++, and Rust), and the variety of node software implementations promotes diversity among users and developers.
1
0
0
@ChainWorld0
UrbitDAO
11 hours
I2P's decentralized architecture VS @SimpleXChat's decentralized architecture
1
0
0
@DoingFedTime
Sam Bent
22 hours
@SimpleXChat You pivoted to tone because you lost on substance. (even that you couldn't disprove, or disagree with) Coerced consent is already invalid under GDPR. You admitted coercion exists. That means the law already covers it. Your "we need new laws" argument just died. Tor relays don't
1
1
14
@privacy_guides
Privacy Guides
1 day
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications.
Tweet card summary image
privacyguides.org
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible.
1
4
32
@cakewallet
Cake Wallet
2 days
Privacy isn't a feature. It's a right. Cake Wallet gives you everything you need: 🔐 Self-custody 🤐 Silent payments 🔄 PayJoin 📖 Open source 🧅 Native Tor This is how Bitcoin should work.
5
19
123
@ethstatus
Status
20 hours
A new era begins! the unified Status Mobile app is here - now on the same codebase as Status Desktop what does this mean for users? ⚡faster feature rollouts 🐞less bugs 💫seamless ux between Desktop/Mobile 🧩easier to build cool stuff on try it out:
Tweet card summary image
status.app
Meet the unified Status Mobile app (referred to as Status Mobile app in this article) — built from a single Status Desktop codebase to deliver a unified experience across mobile and desktop devices. ...
4
10
42
@ChainWorld0
UrbitDAO
1 day
Privacy should not rely on third-party privacy nodes; instead, individuals should build their own privacy nodes.
0
0
0