Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://udongein.xyz/users/lispi314" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lispi314</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.laurenweinstein.org/@lauren" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lauren</span></a></span> <span class="h-card" translate="no"><a href="https://troet.cafe/@pixelschubsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pixelschubsi</span></a></span> yes, but we canbagree that very <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralized</span></a> servers like those of <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> are way more susceptible to that compared to any halfassed <a href="https://infosec.space/tags/OniomService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OniomService</span></a> because it's trivialbto hust shove some <em><a href="https://infosec.space/tags/GlimmerGlass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlimmerGlass</span></a> box</em> on the fiber between a datacenter and their <a href="https://infosec.space/tags/upsream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>upsream</span></a>(sl and just <em>"<a href="https://infosec.space/tags/bullrun" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bullrun</span></a>"</em> the selectively captured traffic...</p><p>With <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> it's much cheaper to actually attack and take down a <a href="https://infosec.space/tags/Server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Server</span></a> / <a href="https://infosec.space/tags/Service" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Service</span></a>.</p><p>For an organization like <a href="https://infosec.space/tags/Signalcthat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signalcthat</span></a> that gets their fans to <a href="https://infosec.space/tags/FUD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUD</span></a> about <em>"<a href="https://infosec.space/tags/Metadata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Metadata</span></a>"</em> it's shocking to see they didn't do an <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionService</span></a> to this day!</p>