ContactDiscoveryService
mobilecoin
ContactDiscoveryService | mobilecoin | |
---|---|---|
70 | 26 | |
270 | 1,152 | |
- | 0.4% | |
0.0 | 9.7 | |
about 1 year ago | 5 days ago | |
C | Rust | |
GNU Affero General Public License v3.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ContactDiscoveryService
- Is it generally ok to store phone numbers in a firestore database?
-
7 Best Open-Source Alternatives To WhatsApp In 2023
[1] https://signal.org/blog/private-contact-discovery/
-
WhatsApp data leak: 500M user records for sale
Signal uses SGX for remote attestation, which presumably lets the client verify that the code running on the server is a build of the OSS code and not a modified version. But I don't know the details or if this is reliable.
SGX and remote attestation described here:
https://signal.org/blog/private-contact-discovery/
-
WhatsApp data breach sees nearly 500 million user records up for sale
Signal does private contact discovery and the effort they've gone to to do this is quite impressive.
- A brief family story about convincing boomer parents to Signal
- Elon on Signal
- Absolutely Insane "Feature"
-
Types of Execution Environments, Attestation and SGX
TEEs have numerous privacy-enhancing applications that may benefit users. One of them is, as discussed earlier, private contact discovery; the Signal application uses a contact discovery service enhanced using Intel SGX, a TEE technology, to protect its users' privacy. A similar application of TEEs is performing malware analysis in a remote cloud service, so that the service may not identify users by the contents of their devices, such as the applications they have installed, especially important as 98.93% of users may be uniquely identified by the list of applications they have installed.
-
Twilio Incident: What Signal Users Need to Know
Signal (or, more accurately, one of its predecessors) used to use client-side private set intersection for contact discovery, but this scales poorly [1].
Now they use a solution based on Intel SGX and server-side trusted computing [2].
[1] https://signal.org/blog/contact-discovery/
[2] https://signal.org/blog/private-contact-discovery/
- Where are Signal servers located and how is it safer than Swiss-based Threema ?
mobilecoin
-
Is this project dead?
On this day last month, v.4.1.0 of the protocol was released, enabling atomic swaps on the MobileCoin blockchain.
- What's up with MobileCoin?
- Mobilecoin - Private payments for mobile devices.
-
Criticism on the scope and reliability of MOB's reliance on SGX, any thoughts ?
There is a distinction between "begin wrong" and "being so absolutely wrong that making a statement transparently communicates how small one's understanding is". The second applies here. He is absolutely wrong here. SGX is one aspect that has some beneficial contribution to the overall ideas in MobileCoin. It is not at all an elementary part. You can read here in detail what happens if SGX would be totally pwned: https://github.com/mobilecoinfoundation/mobilecoin/blob/master/fog-threat-model-2.1.0.md
-
Is anyone able to withdraw MOB from Bitfinex?
General thoughts for a MobileCoin Fog Threat Model can be found here: https://github.com/mobilecoinfoundation/mobilecoin/blob/master/fog-threat-model-2.1.0.md E.g. you find a summary of what an 'SGX-compromising Adversary with root on Fog Infrastructure' can achieve.
-
There is a new payment feature in Signal (Good!) but the implementation makes me feel slightly cheated about the platform itself.
Since you're passionate about the topic, it might make sense to read a bit about why Signal chose MobileCoin as well as MobileCoin's design goals.
- In defense of Signal
-
Monero fork? Whose mining it then?
You are welcome to audit the code yourself.
-
MobileCoin is incompetent, you need a paid Amazon S3 account to run a validator node.
Link here: https://github.com/mobilecoinfoundation/mobilecoin#consensus
- Signal Just Made One Years Worth Of Server-Side Source Code Available In One Huge Dump
What are some alternatives?
whatsapp-viewer - Small tool to display chats from the Android msgstore.db database (crypt12)
cake_wallet - The open source repository for Cake Wallet, a noncustodial multi-currency wallet, and Monero.com, a noncustodial Monero-only wallet. Need help? Check out https://guides.cakewallet.com
TextSecure - A private messenger for Android.
td - Cross-platform library for building Telegram clients
Signal-Server - Server supporting the Signal Private Messenger applications on Android, Desktop, and iOS
status-desktop - Status Desktop client made in Nim & QML
TelegramAndroid - Fork client of Telegram app for Android.
fog - DEPRECATED: Repo Contents moved to https://github.com/mobilecoinfoundation/mobilecoin
simplex-chat - SimpleX - the first messaging network operating without user identifiers of any kind - 100% private by design! iOS, Android and desktop apps 📱!
simplexmq - ⚙️ SimpleXMQ - A reference implementation of the SimpleX Messaging Protocol for simplex queues over public networks.
libsignal - Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible.