Post

Avatar
Avatar
Would be great if you could add Nostr to the comparison.
Avatar
I would like to mention another important difference. In the AT protocol, the identity of a user is always linked to a cryptographic key. If this cryptographic key is only in the possession of the user, then I can be sure that I am communicating with the person I wanted to communicate with.
Avatar
I don't understand any of this
Avatar
Thanks. As a nontechnical person using Bluesky and Mastodon this mostly made sense to me.
Avatar
Avatar
Avatar
One has a Blood Mountain.
Avatar
Avatar
Avatar