Skip Navigation

Posts
56
Comments
73
Joined
3 yr. ago

  • yes, it's been years that I'm using CMD and as I'm planning get rid of windows there is no point for me to learn it.

  • OMG that too bad ! Lemmy that is federated and LOSS use github to track the bugs :/ Too bad I don't have an account. So anyone, feel free to report this bug. Thanks.

  • ok I manage to send my post ! (it look like a lemmy bug... , do you know where to report it ? )

    it seem that lemmy didn't support the following

  • and weirdly, I can post here...

  • not yet, I didn't find enough documentation about that topic.

  • If the computer of the Visitor is already compromised ! your simulation can stop there I think...

    My scenario assume that the visitor computer is not compromised.

    But let say his traffic get intercepted. Sure a hacker can send his PubKey (2) but in (3) the visitor (should) have already the PubKey of one (or few) verification server. So it should not be possible for an hacker to interfer with the communication (3) right ?

  • and what about something like this.

    1. The visitor connect on the website
    2. he receive the public key
    3. The key ( it's hash ) is compared with at least two "verification" server , if they all return a positive match, the visitor can use the pub key to initiate.

    The "verification servers" grab the public key directly from the Web server.

    Any suggestions, ideas ?

  • So maybe the solution relies trough a blockchain ?

    or something that from scratch mind privacy, and decentralization ? Like TOR

  • Thanks for you reaction @breakingcups@lemmy.world

    1. Yes trough Dnssec, or something else ?

    2. Maybe we should go toward a blockchain ? but maybe it's overkill ?