Hacker News new | past | comments | ask | show | jobs | submit | chadsix's comments login

Great Job!

I built something similar but different -- specifically just for tasks without voice -- https://asht.ar -- that might be worth checking out!

We are at 1000+ users and growing! ^^


This is cool. Would love to see something similar that’s open source.


Exactly. You can only trust yourself [1] and should self host.

[1] https://www.youtube.com/watch?v=g_JyDvBbZ6Q


That is an answer for an incredibly tiny fraction of the population. I'm not so much concerned about myself than society in general, and self-hosting just is not a viable solution to the problem at hand.


To be fair, it's much easier than one can imagine (try ollama on macOS for example). In the end, Apple wrote a lot of longwinded text, but the summary is "you have to trust us."

I don't trust Apple - in fact, even the people we trust the most have told us soft lies here and there. Trust is a concept like an integral - you can only get to "almost" and almost is 0.

So you can only trust yourself. Period.


There are multiple threat models where you can't trust yourself.

Your future self definitely can't trust your past self. And vice versa. If your future self has a stroke tomorrow, did your past self remember to write a living will? And renew it regularly? Will your future self remember that password? What if the kid pukes on the carpet before your past self writes it down?

Your current self is not statistically reliable. Andrej Karpathy administered an imagenet challenge to himself, his brain as the machine: he got about 95%.

I'm sure there are other classes of self-failure.


Given the code quality of projects like nextcloud. Suggestions like this makes the head and table transmugify into magnets.


The odds that I make a mistake in my security configuration are much higher than the odds that Apple is maliciously backdooring themselves.

The PCC model doesn't guarantee they can't backdoor themselves, but it does make it more difficult for them.


You also don't have a security team and Apple does have one.


Speak for yourself


> "you have to trust us."

You have fundamentally misunderstood PCC.


I don't even trust myself, I know that I'm going to mess up at some point or another.


Nobody promised you that real solutions would work for everyone. Performing CPR to save a life is something "an incredibly tiny fraction of the population" is trained on, but it does work when circumstances call for it.

It sucks, but what are you going to do for society? Tell them all to sell their iPhones, punk out the NSA like you're Snowden incarnate? Sometimes saving yourself is the only option, unfortunately.


Can you trust the hardware?


There's a niche industry that works on that problem: looking for evidence of tampering down to the semiconductor level.



If you make your own silicon can you trust that the sand hasnt been tampered with to breech your security?


I am part of a company that promotes self hosting and provides external routing for self hosting [1]

We made Cloud Seeder [2] an open source application that makes deploying and managing your self-hosted server a 1-click issue!

Hope this comes in handy for someone! :-)

[1] https://ipv6.rs

[2] https://ipv6.rs/cloudseeder https://github.com/ipv6rslimited/cloudseeder


From the FAQ: * Q: "What about IPv4?"

* A: "While IPv4 is still widely used, its necessity is diminishing as the world transitions to IPv6. (...)"

;)


I like the concept, but only 5 IPs? With IPv6 you should be offering at least a /64 per tunnel.


Great point!

We offer 5 because we're geared toward helping people host appliances as opposed to raw network setup! We also offer automatic RDNS with this as well as the Cloud Seeder appliance!

Thanks again for your comments and as well thoughts!


You can also do this with 1-click and no effort using Cloud Seeder [1]

[1] https://github.com/ipv6rslimited/cloudseeder </shameless>


And for those of you that don't have an external IP, you can use services that provide egress for you like IPv6.rs. [1]

[1] I'm DevOps there! ;)


Thanks for the link, product looks good. Maybe you should work a bit on the website, this is how it looks at my pixel phone on Firefox: https://photos.app.goo.gl/txpxvDQAMYQWRSmi7


> if you have to reason about how the operator will handle legal threats, you shouldn't bother reasoning about the messenger at all.

That's true.

You need to run your own platform people. XMPP is plenty simple, plenty powerful, and plenty safe -- and even your metadata is in your control.

Just self host. There's no excuse in 2024.

Wake up people!

Why should the arrest of someone else affect YOU?


"You need to run your own platform people." What problem does this solve?

I'm someone who's been on the business end of a subpoena for a platform I ran, and narcing on my friends under threat of being held in contempt is perhaps the worst feeling I'm doomed to live with.

"XMPP is ..." not the solution I'd recommend, even with something like OMEMO. Is it on by default? Can you force it to be turned on? The answer to both of those is, as it turns out, "no," which makes it less than useful. (This is notwithstanding several other issues OMEMO has.)


Note in particular that the Ethernet connection to xmpp.ru/jabber.ru's server was physically intercepted by German law enforcement (or whatever-you-think-they're-actually-enforcing enforcement), allowing them to issue fraudulent certificates through Let's Encrypt and snoop on all traffic. This was only noticed when the enforcement forgot to renew the certificate. https://news.ycombinator.com/item?id=37961166


> The answer to both of those is, as it turns out, "no"

This is not true, it depends on the client. Conversations has OMEMO enabled per default.


I don't see any practical difference between "it depends" and "no" here.


This is like saying we shouldn't use TCP/IP because it's not encrypted. How it actually works is that encryption is enforced by the application - indeed the only place you can reasonably enforce it. See for example the gradual phasing out of HTTP in browsers by various means.

What this means in practice is that you shouldn't focus on whether XMPP (or Matrix, or whatever) protocols are encrypted, but whether the applications enforce it. Just as there are many web browsers to choose from, there are many messaging apps. Use (and recommend) apps that enforce encryption if that's what you want.


I'm not sure I agree, particularly given that there's some incentive for us to get our relatives using these messenger protocols and clients. The Web made it work because everyone came together and gathered consensus (well, modulo some details) that enforcing HTTPS is, ultimately, a good idea given the context.

So far, I'm not seeing that same consensus from the XSF and client vendors. If the capital investment can be made to encourage that same culture, the comparison can perhaps be a little closer.


The consensus comes from the people using the clients, not from the standards bodies. It's the same for HTTPs, where the users (in this case the server admins) decided it would be a good idea to use encryption.

There are even apps like Quicksy which have a more familiar onboarding experience using the mobile phone number as the username, while still being federated with other standard compliant servers. There is little reason to use walled garden apps like Signal these days.


As if it were that simple. Where are you going to host that self-hosted instance? What protections against law enforcement inspections do you have? What protections against curious/nefarious hackers? How are you going to convince every single person you interact with to use it?

Gung-ho evangelists rarely convert like a reasonable take on the subject does


  > Just self host. There's no excuse in 2024.
I hate to break it to you, but there's plenty of excuses. We live in a bubble on HN.

May I remind you what the average person is like with this recently famous reddit post:

https://archive.is/hM2Sf

If you want self hosting to happen, with things like Matrix, and so on, the hard truth is that it has to not be easy for someone who can program, but trivial for someone who says "wow, can you hack into <x>" if they see you use a terminal


You're assuming end-to-end encryption doesn't exist, and that the only way to be safe is to have someone close to you self-hosting.

Self-hosting is terrible in that it gives Mike, the unbeknownst creepy tech guy in the group 100% control over the metadata of their close ones. Who talks to whom, when etc. It's much better to either get rid of that with Tor-only p2p architecture (you'll lose offline-messaging), or to outsource hosting to some organization that doesn't have interest in your metadata.

The privacy concern Green made was confidentiality of messages. There is none for Telegram, and Telegram should have moderated content for illegal stuff because of that. They made a decision to become a social media platform like Facebook, but they also chose not to co-operate with the law. Durov was asked to stop digging his hole deeper back in 2013, and now he's reaping what he sow.


Or better use a P2P IM like Jami: https://jami.net


Sadly, you still have to pipe all messages through Apple’s notification API if you want notifications on iOS


Metadata? Yes. The plaintext of the messages is not piped through the notification API.

https://www.medianama.com/2023/12/223-signal-push-notificati...


Wasn’t this the exact rhetoric used to justify PRISM during the Snowden revelations?


I for one am a fan of the short and sweet. I think it's very straight forward -- if someone follows the video they can do the same, with you, in real time and I think that's great.

Good job and good luck with your speech tomorrow. It's really good that you're promoting self hosting -- this really is the final line for the battle of the people vs big data on the internet.


I'm surprised that nobody suggested self hosting a GitLab or Gitea instance. [1]

[1] https://ipv6.rs/cloudseeder


While we haven't made a box, we made the software side in GoLang [1]

This lets you host the most popular self hosted apps with a click[2] and you get an IP from us. :-)

[1] https://github.com/ipv6rslimited/cloudseeder

[2] https://www.youtube.com/watch?v=TjklYTxE8ks


And you can self host it on your own computer with 1-click [1]

[1] https://github.com/ipv6rslimited/cloudseeder


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: