In addition to the issues @Suzi3D points out, it's important to highlight a few differences that separate the arch + design of Panquake.com from networks like GETTER and Parler. Short thread.
First, we're taking #decentralization seriously. Panquake.com conversations are committed to a blockchain record which will be shared around the world. Users on the network will communicate and verify each other using peer-to-peer methods and strong encryption.
Second, the Panquake.com network is built upon #respect and empowerment for users. We're making sure your data lives on your device(s), and don't collect or store the kind of sensitive information that has already been breached from GETTR and Parler, not even email.
What's good for users is good for the network as a whole. The choice to empower "clients" (e.g. your computers) rather than storing everything centrally in databases we own makes Panquake.com dynamic and resilient. It also allows us to better support #anonymity tech.
We're not copying centralized and outdated social media frameworks or attempting to emulate #BigTech models like GETTR and others. We're building blockchain-based transparency and verification for global, public conversations and strong client-side privacy and security for users.
This is before we talk about what will *NOT* be a part of Panquake.com - advertisements, data-broker surveillance, manipulation of timelines and trends, anti-features that treat users as test subjects, AI-powered moderation, dark patterns, KYC doxxing, spy backdoors.
Panquake.com won't treat you or your family and friends as guinea pigs but, if you are guinea pigs, we don't want to know. We'll give you the tools you need for an engaging and fun social media experience, *without* #surveillance - like the Internet should be.
...and if I misspelled GETTR once or twice, that's a casualty of holding the shift key while typing their brand name :P
• • •
Missing some Tweet in this thread? You can try to
force a refresh
I spent an hour last night analyzing the #IowaCaucasDisaster app that VICE reported on. There's nothing outwardly terrible from a privacy and security standpoint at first glance, but it may be worth digging more. Thread. 1/ vice.com/en_us/article/…
The app is seemingly clean from malware and tracker SDKs, although there is some Google and Facebook code when I disassemble the classes.dex file. Exodus Scan output below (I had to use the CLI because the app is not in Google Play). 2/
Here's the output from VirusTotal, which also includes the app permissions from the Android manifest. Did they actually use the camera and fingerprint reader? 3/ virustotal.com/gui/file/70fa1…