pull down to refresh

I wanna get naked too
reply
0 sats \ 0 replies \ @ek 17h
what stops you
reply
102 sats \ 0 replies \ @ek 18h
This dependency on the authentication service does sound pretty bad, thanks for sharing!
Does the MLS specification offer a practical mechanism for the end users to mitigate the effect of a compromised Authentication Service? No, it does not; it only refers to the approaches based on key transparency, but they are not practical in real-world applications, and, to the best of my knowledge, are not implemented in any of the communication platforms that deployed MLS.
I wonder if White Noise implemented key transparency?
reply