@lnxw48a1 @gargron I sometimes "silence" users who are too verbose, and taking up too much of my stream. But if I get time I will look over their posts. ( Using quitter tools )
P.S don't expect Gargron to see this as posts dont' appear to go to mastodon.social and I can't get an admin over their to debug
kat (boneidol@indy.im)'s status on Friday, 20-Apr-2018 22:38:21 UTC
katI'm being stalked on some dating site. It happens every month or so. Some anonymous a/c starts chatting, then says they've seen me commuting, or have met me before, but they don't identify themself. I ask them too but they play a "guess me" game. So I block and then it happens again! Such is life.
@zoowar placing the day/month in the wrong order is an act of genius by the Americans. It gives a much better chance for abitrary numerological coincidence!
kat (boneidol@indy.im)'s status on Friday, 20-Apr-2018 07:16:39 UTC
katI have put on quite the wrong outfit for work today. Skirt too short. Blouse too low cut. Black boots.. the skirt has a grey herringbone horizontal stripes. The blouse black/white stripes. I have a different pair of shoes in the office which will help some but too late to change now. I shall be hiding in the office. Also my hair is a mess.
@zoowar it is a problem... without a central source how does one know how to trust anything. I guess DNS does solve that. I was engaged with #monkeysphere once using PGP WoT to cross validate x509 https certs. http://monkeysphere.info/
@mistressemelia @paulfree14 for sure. However once the address is published it can never be removed. We can print the onion on t-shirts and spray paint on walls. It will always work.
@mistressemelia @paulfree14 the hash of the public key for the site, is looked up in a DHT, to get the routing information, same as a bittorrent magnet link finds the file. But with some anonymity layers thrown in too. It's super interesting crypto/P2P design. Another cool project #i2p has lots of similarities https://geti2p.net/en/
@gcupc I agree with your human rights violation. However... it's very common to find it in Bring Your own Device #BYOD situation in corporate or education. Where the user will be told to install an additional CA to use the network. /cc @paulfree14 @mistressemelia
@mistressemelia @paulfree14 a tor hidden service would protect you from DNS hassles. Users go and grab the tor browser bundle and just use that. ".onion" addresses are well known to be associated with #tor, and the Tor project has loads of mind share and documentation. For example I'm a big fan of http://uj3wazyk5u4hnvtk.onion .. pirate bay is blocked on many #UK ISP ... #meh! I wasn't suggesting that your primary point for engaging with users be a tor hidden service, but having a resilient censor resistant service sounds ok ? Obviously deploying onions has its risks, but they are mostly fixable https://riseup.net/en/security/network-security/tor/onionservices-best-practices