By typing on what device that's "stand alone?" What piece of hardware do you have available to connect to a desktop, laptop or mobile device to encrypt what you type before it goes through that device [encrypted] onto the blockchain?
The level of privacy you can expect out of Zenchat is the same level you can expect from any computer/mobile phone/device where you have to type a password or private key. You have to know that it's not compromised.
Sounds like a damn political talking point to me.
There is no perfect mouse-trap... but it's a good start.
So damn what they are stored permanently in the blockchain. I'm sure the NSA stores them as well from key strokes before they ever hit your damn blockchain.
WHY the hell do you think Trezor has a hardware device to encrypt data BEFORE it goes through a device to go to the blockchain?
BECAUSE THEY UNDERSTAND HOW HACKERS and GOVERNMENTS CAN SEE DAMN KEYSTROKES
PRIVACY is not as cut and dry as some of you make it out to be!
Are you saying that the NSA has a backdoor into every device?
Apple says our data is protected on an iPhone. Yet, the NSA can easily see EVERYTHING in that iPhone without it being unlocked. They can hear people talking even when you THINK the phone is off. All of that crap in the news a while back with CNN and others acting like they were mad at Apple for not allowing the FBI to have a master key to all iPhones to unlock iPhones was nothing but a Psy-Opp. They want the population to think our data is safe on an iPhone when that is further from the truth.
Eh... iOS code at Apple goes through rigorous tests to make sure that it's not backdoored or compromised. Unless Apple want a backdoor to exist... it doesn't just appear out of thin air.
Here's another example: If you have a smart meter on the side of your house to measure your power consumption, that smart meter can be used to convert longitudinal currents on the power line into metallic currents used by the device [and visa-versa]
What are you talking about here? What is a "metallic current?"
...to hack into your lap top or desktop WITHOUT IT CONNECTED TO THE INTERNET VIA CONVENTIONAL SOURCES; such as telephone or cable modems. Your device CAN be connected to via the power outlet the moment you connect it to power to charge it up. There is more to the smart meters on the sides of our homes and businesses than the population is aware of. I bet you didn't know that did you? I worked in intelligence in the Marine Corp. You'll be SURPRISED what the government can do.
Hmmm... this sounds made up. AC current is converted to DC current to run a computer. If there was a signal present on the AC current, it would be destroyed in the AC-to-DC conversion. And second... computers don't respond to a signal unless there is a hardware device that can interpret and process the signal. No device exists in your standard computer, and it certainly doesn't exist in your AC-to-DC converter.
The power companies were actually trying to get a license to provide internet to customers a few years back but it was denied by the FCC. Why? Because intelligence did not want the cat out of the bag about how they can access devices through the power line without you being connected to the internet via conventional means.
Again, this is not correct. You would require a modem that could interpret any signal that rides on the AC current. I worked on a contract about 20 years ago where a newly de-regulated power company was experimenting with providing network services over power lines, but it was unfeasible as the signal is destroyed over any significant distance. Think about "power-line ethernet" that is available today. Signals just do not transmit across breakers and transformers very well.
The government can spy on you through a device the moment that device is connected to a power source. Especially, if the power source is monitored by a smart meter.
No they can't.
To take that previous example about connecting to devices through power lines a bit further: If an agent needs access to a computer held by a terrorist in a country without smart meters, they have to use actual feet on the ground with access to the terrorist power in their building or home to then connect a device to their power line to gain access wirelessly from a safe location to hack their computer the moment it's plugged into power. The terrorist thinks they are safe not connecting to the internet with that device with sensitive information but they are sadly mistaken.
Again... there is no signal modulation happening across power lines. A computer has no physical capacity to do so without a modem being covertly added. And at that point, why bother with trying to send signals across a power line? You can just send them wirelessly to a transceiver on the outside of a house.
I was actually curious about how ZEN was going to pull this off with PRIVACY of all our data. Because I "KNOW" it's NOT possible without a hardware device that's encrypted before it's connected to any other device. Yes, ZEN would be able to keep users data private from most people. But from governments or institutions with the means and the knowhow to see our data, it's not cut and dry as most people might think.
Right now, all I'm seeing/hearing is a marketing ploy to get adoption with fancy slogans and artwork. I have yet to see any REAL SOLUTIONS from this project to actually keep our data private from governments and institutions with the means and the knowhow to access our data.
How would you propose to solve the problem?