• Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    1 year ago

    Session will use full onion routing and it should hide most metadata from your communications. It also uses strong encryption so it should be hard to brute force the encryption

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        I never said they used the Tor network. I just said they use onion routing over lokinet. Lokinet is pretty powerful and is much faster than Tor. In the future we may see other messaging apps use lokinet assuming it works well and is secure

        • Devjavu@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          1 year ago

          And I did not say you said that. Thatdoes not matter though, as what I say still stands. The network they use for onion routing is incredibly weak. Even Tor isn’t as powerful a network as most would think.

          Also: Speed does not matter. Speed ≠ strength.

          • Possibly linux@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            Speed does matter though. You can’t video call over Tor because its slow.

            Lokinet also is smaller in popularity than Tor so it will have less nodes. Hopefully it will scale. I personally am kind of interested in running a node as it looks like it could be profitable

    • inspxtr@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      while the following is not really my threat model, wouldn’t a person who’s being targeted, say a journalist/activist, have a higher chance of their device being compromised (possibly even physically)? If so, would Session still be a valid option for them?