![]() ![]() This makes it really less efficient with the energy.īut it’s also now trivial for attackers like the NSA (the group hackers are typically trying to escape from) to create their own Bitmessage address,Ĭollect every message sent on the network and try to decrypt it because apparently, it’s what it already does ! The Bitmessage protocol works by sending a given message to everybody in the network. One unusual thing about Bitmessage that comes to mind is the way it uses P2P technology. ![]() The foundation of Bitmessage itself is easy to understand,īut as soon as you dive deeper into it (a task I think is really important when talking about safety protocols), you it gets confusing rather quickly. However, even if you take this route, you still have to be careful. I think the best way to share a Bitmessage address is to publish your address on a website you control. Like so easy to send your message to someone else now ! The addresses look like strings made out of random characters, so they’re a real hassle to exchange to your pen pals.Įven give your address on a piece of paper could be risky because your friend may make a mistake while copying it. In my opinion, this is the perfect anti-example because it does not respect the carpet paradox : We have OpenPGP and its software implementations, PGP and GPG, which are tools to protect your mail from unwanted lookup. ![]() Part 1 : Is there any other way than using GPG ?.You can safely skip this part or come there later when you understood more. NB : This article is much targeted to people with a special interest in IT technology itself as an overview of secure communication alternatives to GPG.ĭon’t worry if you feel like this part is too complicated or like it’s going over your head. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |