The main site is located here: molly.im
The first paragraphs on the donation page:

The goal is to build a secure messaging app with integrated support for Monero payments and a decentralized backend.

The application will be based on the Signal fork Molly.im (henceforth ‘Molly’) but with a privacy-focused backend that allows the user to sign up anonymously (without phone number), encrypt their local database with passphrase encryption, RAM shredding, and more.

Monero features will include the ability to set up a XMR wallet, send and receive funds, keep track of the balance, and review the history.

  • aexiruch@lemmy.ml
    link
    fedilink
    arrow-up
    27
    ·
    3 years ago

    Payment does NOT belong in a messenger, way too high a risk of an exploit in one leading to control over the other.

    • SusPillow9328@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      3 years ago

      While I agree with this, many other messengers have payments and not having them could prevent people from switching. I would rather use Signal’s MobileCoin than whatever Facebook comes up with, mobile payments are HUGE in Asia and is probably coming to the US too.

      • pinknoise@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        3 years ago

        mobile payments are HUGE in Asia and is probably coming to the US too.

        But there is no need to have it in the messenger. That just sounds like a stupid idea: make your payment system connected to the internet, addressable by name and make it parse and load all kinds of media. Mobile OS have per-app sandboxing so why not take advantage of it?

      • aexiruch@lemmy.ml
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        3 years ago

        There is no good reason to risk any amount. It is ridiculously idiotic; like having a wallet on the outside of your car to pay for parking tickets… sure, it’s a tiny bit more convenient and as long as you’re either driving or parking your car in a garage most of the time it’s unlikely the money will be stolen, but who the fuck thinks it’s a good idea? Also note the risk of the reverse; Cryptocurrencies are a juicy target and lot’s of code has been found exploitable over the years. I’d be just as worried about an exploit in that part leading to a breach into the messenger security… It is a fundamentally stupid idea to combine these.

        • peppermint@lemmy.ml
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          3 years ago

          You have a point, but again you have a money’s worth stake on your messenger of choice, as well as the platform. No doubt they have a lot of holes, but credit card or password stealing is the same thing. You totally forget that coins like ethereum, bitcoin and such are traceable, so there is no way to cash out stolen money.

          • Geotechland@lemmy.ml
            link
            fedilink
            arrow-up
            6
            ·
            edit-2
            3 years ago

            I think having payment in the messaging app will be expected as it is becoming the norm. But I don’t like that signal is partnering up with a private crypto coin corporation.

            Is the answer necessarily cryptocurrencies? Maybe a stablecoin version or just some different intermediate way to send payments privately that doesnt involve cryptos?

            • peppermint@lemmy.ml
              link
              fedilink
              arrow-up
              4
              ·
              edit-2
              3 years ago

              There is GNU Taler from GNUNet project (its not popular ofc), and hashgraph (discussion here https://libredd.it/rty0vt ), the main advantage of monero and crypto more generally is to have a way to send money.

              Stablecoin is also full of shit, as in practice it is backed so little and with securities rather than moneu that it can easily crash. I heard that Nova coin transactions used in WhatsApp trigger movements in underlying USD accounts, if that’s more what you’d be expecting?

      • aexiruch@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        3 years ago

        Disabled != Not even in the binary. Buffer overflows regularly lead to executing “disabled” (read: behind an “if” statement) code.

        • Seb3thehacker@lemmy.mlOP
          link
          fedilink
          arrow-up
          1
          arrow-down
          5
          ·
          3 years ago

          From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place

          • Seb3thehacker@lemmy.mlOP
            link
            fedilink
            arrow-up
            1
            arrow-down
            4
            ·
            3 years ago

            Another comment from them: Also consider that Whatsapp and iMessage were exploited by flaws in the multimedia libraries. Should we remove image and video sharing in messaging apps?

    • Seb3thehacker@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      4
      ·
      3 years ago

      From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place

      • Seb3thehacker@lemmy.mlOP
        link
        fedilink
        arrow-up
        1
        arrow-down
        3
        ·
        3 years ago

        Another comment from them: Also consider that Whatsapp and iMessage were exploited by flaws in the multimedia libraries. Should we remove image and video sharing in messaging apps?

  • palindromi@feddit.de
    link
    fedilink
    arrow-up
    9
    ·
    3 years ago

    Why should I want a wallet inside the code of a secure messanger?

    Keep it simple and save. One tool for one job.

    We have seen what some imported/used libraries may open holes in the software. (Hint: Log4j)

    • Seb3thehacker@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      3
      ·
      3 years ago

      From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place

      • Seb3thehacker@lemmy.mlOP
        link
        fedilink
        arrow-up
        0
        arrow-down
        4
        ·
        edit-2
        3 years ago

        Another comment from them: Also consider that Whatsapp and iMessage were exploited by flaws in the multimedia libraries. Should we remove image and video sharing in messaging apps?

  • kixik@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    3 years ago

    If this materializes, is there any other signal forks, able to connect to signal servers for messaging, like molly? I remember reading about some, but I have always preferred molly.