End-to-end encryption isn't everything.
We can never know if the encryption we are using is good enough. So it is always a good idea to use additional techniques for security. Even if those obscurity solutions are weaker, they are still something when added on top of the hopefully strong encryption.
Governments spend inordinate amounts of money on decrypting things. They want to know what other world leaders are saying behind their backs. The USA has an entire agency dedicated to this, the NSA.
But IMHO they aren't just decrypting everything. They most likely have to pick and choose where to focus their resources.
If you route your data through Signal or Tor, you are painting a target on it that says "This data wants to be private". That makes such data more likely to be targetted by governments for decryption. If your data instead transits little-used servers in obscure data centers or in people's houses, like nostr relays, especially personal nostr relays, that target painting doesn't happen.
So I'm not a fan of routing everything through Signal. Maybe even it is a bad idea for Iroh to route QUIC connections through their relays when hole punching fails. I'm sure Iroh relays aren't doing anything nefarious yet, but if it gets popular then the government(s) may force them to and also force them to not tell us. It is another target painting situation. And so I'm not sure that hole punching is such a great idea.
Login to reply