# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 4
# self = https://watcher.sour.is/conv/672x76a
I'm sorry if I'm bursting anyone's bubble by repeatedly pointing out that technologies like Tor or i2p or blockchain whatits aren't as safe and secure as you've been led to believe. The truth is, you always need to have a threat model, and calibrate your expectations against it. If you want some piece of information to be inaccessible to, say, the US NSA, Tor or i2p will be inadequate. If that's not your threat model then maybe they're fine for you, though personally I don't trust overlay networks like that because they're black boxes to me. "Anyone can run a node" is terrifying to consider.
@abucci I'm insisting speed is of great importance here. The longer it takes for them to get to your funds the better is for you, you have something to exchange for goods!
@abucci Frankly, the notion of decentralized social systems that we tout that are actually mostly distributed networking systems horrifies me 🤣
@abucci Frankly, the notion of decentralized social systems that we tout that are actually mostly distributed networking systems horrifies me 🤣