
Ghost Room
75 posts

Ghost Room
@GhostRoomSol
A privacy layer for payments & communication. Online or offline fully encrypted, identity-free, and unstoppable.




My guy… you’re shouting louder than the scam itself 💀 If this ‘Dallas office block’ is really his, tell him to drop ONE thing: 📄 the lease contract. Should be easy, right? Real office = real paperwork. But instead we’re here defending a dude who grabbed a photo that’s literally floating all over the internet. I found the SAME picture online in seconds , same walls, same furniture, same angle, same everything. Scammers always slip up exactly like this. No office. No proof. No transparency. Just vibes. So before barking, maybe tell your boy to provide evidence. Until then, sit back and shush , the adults are exposing a liar.

Things happening @ZeraLabs



Bro… enough with the nonsense please 😭 If you’re gonna claim ‘new offices’, at least pick a photo that doesn’t scream ‘commercial real-estate brochure’. This pic is literally showroom level clean. No team. No laptops. No wires. No documents. Not even a fingerprint on a desk 💀 The wall art, the carpet, the desk setup , it’s the exact template coworking spaces use in their online listings. You can even see the city-view marketing angle they always use. My guy didn’t open an office… He opened Google Images 🤣 Next time just show your real space, even if it’s your kitchen table , we respect honesty way more than Pinterest offices.














These are way more coherent than the first round of answers I appreciate that. - Perfectly reasonable choice, its plausible. - You have a few design issues with AES: shared password-derived key for the whole group. Anyone with the password or the ability to get the password can decrypt everything past or present this also brings in the ability to use dict attacks or just phishing attacks. That makes it so your encryption is vulnerable. You should never reuse a the nonces. This is not "military grade encryption" at its core. - No data trails should be phrased as "no persistent logs". There will always be data trails with the ledger, I get why you said it and the marketing behind it, but its misleading compared to the actual design. - Makes sense with the UTXO, but your public material specifically states Solana there is no other talk about it (unless I missed it)? - The Bluetooth is plausible. I actually really like the idea, I'm curious how you are doing re-fragmentation/reassembly on the other end with packet loss and in the presence of DoS like peers? Thanks for the donation, we appreciate it. Do you have any code I can peer review?










