RULES
The Hub is moderated for decorum. Please follow these rules while participating in The Hub:
- Be courteous and friendly to new members.
- Do not attempt to scare off new users from using the platform.
- Do advertise your Tribes and invite users to join conversations in them.
- Always Follow Our Content Policy
These rules only apply to The Hub with the exception of the content policy which is site-wide. Please observe individual tribe rules when visiting other tribes.
Sick of Rules? Want to Shit-talk?
Join The Beer Hall
Want a FLAIR next to your name? Send a message to redpillschool. Reasonable requests will be granted.
Have questions? Ask away here!
Join our chatroom for live entertainment.
@SwarmShawarma I'm a software developer (heh) so yeah, I can write it myself.
But I get what you mean
I'll happily go the rest of my life without ever putting my dick into an anus again.
but what about Donkey?
@Typo-MAGAshiv why is your flair 'never shit posts' ....
All these trad whores just need to be completely disregarded at this point
Women cannot handle having a social media presence without devolving into evil/user/humiliation tropes
Way too much power. Women damn near always abuse power and influence and fame
The ONLY software I would trust is PGP, or GPG
technically yeah, but common misconception here is to trust middleman. When you mention software, well anything else being used IS SOFTWARE as well: signal, telegram, ProtonaMail. Unless you can write a GPG-encoding software yourself [or if one has skills to verify the code then to NEVER update], then maybe keep it on separate device.
I asked grok is it easy, what's your opinion?
No, it is not easy to write your own script that properly implements PGP-style asymmetric encryption (more precisely: the OpenPGP format) — at least not if you want something secure and interoperable.
What you actually need to do it "properly" (OpenPGP style)
- Generate or parse keys (RSA, ECC Curve25519/Ed25519, etc.)
- Handle OpenPGP packet format (very complex — literal data, encrypted data, signatures, one-pass signatures, compressed packets, modification detection code (MDC), AEAD in newer versions…)
- Implement hybrid encryption:
- Generate random session key
- Encrypt session key with recipient's public key (RSA-OAEP or ElGamal or ECDH)
-
Encrypt actual data with AES (usually CFB or OCB/AEAD mode)
- Correctly implement symmetric encryption modes (especially the strange OpenPGP CFB variant with MDC)
- Handle compression (ZIP/ZLIB/BZip2)
- Deal with ASCII-armor (Base64 + headers)
- Implement partial-length packets, streaming, etc.
- Add timing attack resistance, side-channel resistance, proper random number generation…
- Handle key preferences, subkeys, revocation, trust model (if you want WoT)
Even very experienced cryptographers usually don't implement OpenPGP from scratch — they use libraries like:
- Python: pgpy, gnupg (wrapper around GnuPG), pyOpenPGP
- JavaScript: openpgp.js
- Rust: sequoia-pgp, rpgp
- Java: BouncyCastle (PGP classes)
- Go: golang.org/x/crypto/openpgp (but somewhat outdated)
I think it's noteworthy that in pretty much every one of these "where are the single men?" videos I've seen, these women display an attitude that reminds me to stay away from them. It's this demanding, almost berating attitude, that says, "Men? Oh, men? I need to be served now." snaps fingers
The straight single men are in 2 categories:
-
The type of man you overlook and ignore. The type that women like this one will never even care to ask if he is single because she will not even consider him.
- The type of man who has simply given up on the idea of seeking a relationship with a woman. For a number of reasons, these men just do not want to try and find a woman to date.
The funny thing about both of these categories of men is that if women altered their perspectives on dating, they would find many more willing and available men. But since we have not reached that point on a wider scale, the invisible men continue to be overlooked and the uninterested men remain uninterested.

