diff --git a/blog/untrusted_the_issue_with_decentralisation.xhtml b/blog/untrusted_the_issue_with_decentralisation.xhtml index a660f7f..9490c61 100644 --- a/blog/untrusted_the_issue_with_decentralisation.xhtml +++ b/blog/untrusted_the_issue_with_decentralisation.xhtml @@ -1,7 +1,7 @@ - + @@ -16,23 +16,23 @@
Posted: 2022-06-30 (UTC+00:00)
Updated: 2023-11-11 (UTC+00:00)
A recent trend is seeing people move towards decentralised services and platforms. While this is reasonable and I can understand why they are doing such a thing, they are seemingly doing it without thinking about the possible @@ -54,9 +54,9 @@ will discuss some of the security issues with the decentralised model.
When it comes to messaging your contacts on a centralised platform, such as Twitter or Facebook, the keys are pinned to that user account, using the user's password as the method of @@ -94,7 +94,7 @@
I'll cut to the chase; there isn't a definitive solution. The best way to handle this situation is to design your threat model and think about your reasoning for avoiding centralised platforms. Is it lack of trust of a specific @@ -139,7 +139,7 @@ would make this impossible to implement in any form.
Do not demand anonymity; demand privacy and control of your own data. Complete anonymity makes it impossible to have a root of trust, and is typically never necessary. It is possible for someone else to hold your keys, without them