Are you aware that by doing SMS verification (optional or not) you're making your servers a very juicy target for hackers working for Chinese intelligence? They could probably assume that anyone in Hong Kong with the app is a protester
Hi Jorge, fyi I just browsed for Bridgefy on google and clicked on the first link that showed up and some random page turned up. It looked like it was hacked or something.
That happened to me as well. Can anyone explain to me how that works? Is there entire site hacked, but only triggered when coming from Google? Or does it work some other way?
That first link from Google is highly NSFW. A fully nude woman appears on the screen from some scammy local dating ad network. Has their DNS been hijacked?
Pardon my ignorance but lets say that someone runs a typical cell phone jammer in the area, would that block the Bluetooth signal from working or are RF wavelengths not able to be jammed?
They'd have to specifically jam BT or all the public 2.4 Ghz band which includes WiFi and other protocols. Given that a BT jammer can be bought online for less than 100$, it's trivial to block this app over several tens of meters.
Since we use Bluetooth Low Energy and the algorithm works to make broadcasting/forwarding efficient, we've found that running messages for 24 hours consumes around 7-10% battery total on an average device. These numbers may differ depending on the OS, device, usage, etc. but in a nutshell: we don't consider battery consumption to be a problem.