Bitmessage: Secure, NSA-Proof, Decentralized Peer-To-Peer Encrypted Messaging
Bitmessage
Secure, NSA-Proof, Decentralized Peer-To-Peer
Encrypted Messaging
Secure, NSA-Proof, Decentralized Peer-To-Peer
Encrypted Messaging
Bitmessage Is A P2P Communications Protocol Used To Send Encrypted Messages To Another Person Or To Many Subscribers. It Is Decentralized And Trustless, Meaning That You Need-Not Inherently Trust Any Entities Like Root Certificate Authorities. It Uses Strong Authentication Which Means That The Sender Of A Message Cannot Be Spoofed, And It Aims To Hide "Non-Content" Data, Like The Sender And Receiver Of Messages, From Passive Eavesdroppers Like Those Running Warrantless Wiretapping Programs.
If Bitmessage Is Completely New To You, You May Wish To Start By Reading The Whitepaper.
If Bitmessage Is Completely New To You, You May Wish To Start By Reading The Whitepaper.
Setting Up And Using Bitmessage – An Encrypted Communications Platform Based On Bitcoin
I’ve just finished reading the Bitmessage white paper by Jonathan Warren and must say I find myself inspired. BitMessage is the decentralized peer to peer communication system that uses basic encryption to keep both sender and receiver anonymous, if they choose. While Bitmessage is still very new, it is a potential game changer when it comes to secure communications. Living in a time where large data centers that can store all our private communications are a reality, BitMessage provides a degree of resistance. Here’s an overview of BitMessage as well as a quick tutorial on setting up the client.
An Overview Of Bitmessage
BitMessage uses a form of public key encryption to secure communications between two parties over the internet. As outlined in the Bitmessage white paper current solutions for encrypted email are difficult to use and require exchanging both an email address and encryption keys through a trusted third party.
With BitMessage a series of unique solutions are used to allow users to communicate with just a 36 character address. The protocol, loosely based off of Bitcoin, uses your computer’s processing power to process messages. Each message requires a proof of work that is designed to take around four minutes.
Another important feature of Bitmessage is the ability to broadcast messages or to subscribe to broadcasts. Broadcasts are messages that are sent out to any group of Bitmessage users that are listening. In this way, organizations or individuals can get information out to their subscribers anonymously if they choose. I’ve recently started to use Bitmessage’s broadcast feature for my recent posts and updates here on CryptoJunky.
Setting Up Bitmessage
Setting up BitMessage couldn’t be easier. If you’re a windows user download the .exe file. If you’re a Mac OS X or Linux user the python code is available through BitMessage.org. I’ll be covering the basics with Windows here, though it should be about the same with Mac OS X and Linux. Once you’ve opened up BitMessage you’ll need to create an ‘identity’ or two as they’re referred to.
BitMessage Your Identities
Start by going to the ‘your identities’ tab and clicking ‘new’. You’ll see two options pop up, one that allows you to make a random number generator and another that uses a passphrase to make addresses. I suggest that you use a passphrase to make your address(es) as you will then be able to use these identities on another machine or another installation of BitMessage. If you choose this option you will also have a number of addresses to make, the default is eight.
BitMessage Create Identities
Once you’ve decided on a passphrase go ahead and find a good place to store it or have something easily remembered. There is no recovery kit for lost BitMessage passwords. You’ll also need the address version number to replicate these addresses on another computer (I also record the Stream number).
Sending And Receiving Your First Message
So you have your client set up and you’d like to actually use this thing. Well if you’d like to send a test message you can send one to me and I’ll send one on back. Go to the ‘send’ tab of the BitMessage client and enter the following address in the ‘to’ field:
BM-GuP5bGJH6un5dRdT2wV5MsB4Nv7zvVYz
Once you’ve done that just choose one of your addresses to use as a ‘From’ address and fill in your test message. Once the message is complete click send. It will take a few minutes for the message to be processed and sent so don’t shut down BitMessage or your computer during that time.
BitMessage Send Message
If you’d like to try out the broadcast/subscription feature you can go to the ‘Subscriptions’ tab and click the add button. Enter the same address as above and you’ll receive the messages I send out when I have a decent new post or service to announce.
BitMessage Communities
Given that BitMessage is still relatively young there aren’t too many communities for it yet. If you’re starting out now it’s like that you’re an early adopter. There is a BitMessage forum over at BitMessage.org. There is also a BitMessage subreddit over at Reddit.com under r/BitMessage. There’s a lot more that you can do with BitMessage than just what I’ve covered here so play around with it, explore, and let me know what you find!
That’s all I have for now on BitMessage. If you have a story or tip related to BitMessage, Bitcoin, or Encryption send me a BitMessage at BM-2DBXxtaBSV37DsHjN978mRiMbX5rdKNvJ6 or you can send me an email at: Monty@DPL-Surveillance-Equipment.com.
An open source client is available for free under the very liberal MIT license. For screenshots and a description of the client, see the CryptoJunky article: "Setting Up And Using Bitmessage".
Here is a simple echo server which will send your message back to you after being received: BM-orkCbppXWSqPpAxnz6jnfTZ2djb5pJKDb
Source Code:
You may view the Python source code on Github. Bitmessage requires PyQt and OpenSSL. Step-by-step instructions on how to run the source code on Linux, Windows, or OSX is available here.
Bitmessage should run on any OS though it is only lightly tested on OSX. The start-on-boot and minimize-to-tray features are only implemented for Windows thus far.
Security Audit Needed
Bitmessage is in need of an independent audit to verify its security. If you are a researcher capable of reviewing the source code, please email the lead developer. You will be helping to create a great privacy option for people everywhere!
Forum
Visit or subscribe to the Bitmessage subreddit.
A community-based forum for questions, feedback, and discussion is also available at Bitmessage.org/forum
Germany Thumbs Nose at the NSA
The global backlash against the National Security Agency’s cyber spying picked up a notch as Germany’s leading telecom company announced that all email flowing among three of the nation’s email services will remain on German servers at all times. The move reflects powerful differences in the way that Americans and Europeans view privacy—and just happens to coincide quite nicely with the commercial interests of European Internet companies, who have yet to achieve anything close to the scale of Google Inc. or Amazon.com Inc.
Lost in the political and economic battle, which President Obama addressed are the interests of corporations and other users, who will find that their enhanced privacy—whether they want it or not—will add complexity to their business. President Obama called for an overhaul of surveillance policy that would disclose more information about a secret national security court and disclose more information about the National Security Agency. He also acknowledged that the review was prompted by NSA leaker Edward Snowden.
“It is completely political,” David Horrigan, an analyst and attorney at 451 Research, said of the new policy in Germany. Announced by Deutsche Telekom AG, the new program, called “Email Made in Germany,” will encrypt German email and warn Internet users when they are sending email to a service that isn’t part of the program. The three participating companies are DT’s T Online, GMX and web.de. A government mandate of the same policy has been discussed, but not enacted.
If national security demanded it, German and French law would allow authorities to exercise the same sort of surveillance powers that their counterparts in the U.S. wield, according to Mr. Horrigan, who specializes in e-discovery and information governance. He said that he wasn’t making an assessment of the merits of the NSA program one way or the other.
But political gestures often have huge business consequences. Mr. Horrigan said U.S. Internet companies need to take the European objections to NSA spying seriously. “I think the U.S. companies really must address the issue,” he said. He said that they need to explain just how narrow the differences in the U.S. and European government spying powers really are. If they don’t, European rivals may well succeed in using the NSA spying issue as a competitive opening.
At the technological level, the new program adds complexity to networking and IT, but it is technologically feasible, according to Mr. Horrigan. Even in developed countries, “you can stipulate that certain kinds of information have to be on certain servers,” he said. That’s true even in the case of U.S. operations of German companies, he said. That does not mean, however, that it is easy to do.
“Although it’s feasible technically to limit data to non-US servers, from a practical standpoint, it’s a nightmare. For instance, most large German-based multinationals have U.S. operations. Keeping that data off U.S. servers presents substantial challenges,” he said.
Compliance would add costs to doing business, Mr. Horrigan said. “One way to comply with the new policy would be to have silos of computer operations, which is not particularly efficient,” Mr. Horrigan said. That would mean keeping U.S. computer operations on U.S. servers, German computer operations on German servers, and so forth—adding layers of infrastructure for no technological reason, at a time when most operators are reducing them.
It’s also unclear just how effective a defense email encryption will be. One such service shut down this week, as the Download reported on Friday. Jon Callas, co-founder of Silent Circle Inc., said on Twitter and in a blog post that Silent Circle had ended Silent Mail. Silent Circle will continue to offer secure texting and secure phone calls, but email is harder to keep truly private, Mr. Callas wrote.
DPL-Surveillance-Equipment.com's Secure Messaging Address:
BM-GuP5bGJH6un5dRdT2wV5MsB4Nv7zvVYz
Send Us A Test Message Just To Say Hello.
Additional Resources:
Online Privacy Tools and Tips
Next-Generation Bug / Microwave / ELF / Spy Phone / GSM And Camera Detectors (Buy, Rent, Layaway) tinyurl.com/2eo8mlz Open...
— Spy Store Rentals (@MontyHenry1)
Nanny IP (Internet) Cameras, GPS Trackers, Bug Detectors and Listening Devices, etc, (Buy / Rent / Layaway): tinyurl.com/396jlw6...
— Spy Store Rentals (@MontyHenry1)
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
• Remote Video Access
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
Make Your Own Nanny Cameras: Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!
Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!
* You Buy Our DVR Boards And We'll Build Your Products! (Optional)
* You Buy Our DVR Boards And We'll Build Your Products! (Optional)
Our New Layaway Plan Adds Convenience For Online Shoppers
DPL-Surveillance-Equipment's
layaway plan makes it easy for you to buy the products and services
that you want by paying for them through manageable monthly payments
that you set. Our intuitive calculator allows you to break down your
order's purchase price into smaller payment amounts. Payments can be
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment® Services and you will receive your order once
it's paid in full. Use it to plan and budget for holiday purchases,
anniversaries, birthdays, vacations and more!
DPL-Surveillance-Equipment's
Customers can now use the convenience of layaway online to help them
get through these tough economic times.
We all shop now
and then just to face a hard reality -- big credit card bills. However,
our latest financing innovation can help you avoid that. Find out why
more and more shoppers are checking out DPL-Surveillance-Equipment's
e-layaway plan.
If you're drooling over a new nanny
camera, longing for a GPS tracker, or wishing for that spy watch, but
you're strapped for cash and can't afford to do credit, do what Jennie
Kheen did. She bought her iPod docking station (hidden camera
w/motion-activated DVR) online using our convenient lay-away plan.
Our
online layaway plan works like the old-fashioned service stores used to
offer. But, in Kheen's case, she went to
DPL-Surveillance-Equipment.com, found the iPod docking station (hidden
camera w/motion-activated DVR), then set up a payment plan.
"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.
In
three months, Kheen had paid off the $650.00 iPod docking station. She
paid another 3.9 percent service fee, which amounted to about $25.35
(plus $12.00 for shipping) for a total of $687.35.
"You
pay a little bit each month," Kheen said. "It's paid off when you get
it and you don't have it lingering over your head. It's great."
Flexible
payment terms and automated payments make our layaway plan an
affordable and fiscally responsible alternative to credit cards.
1. Register:
It's quick, easy and FREE! No credit check required!
2. Shop:
Select
the items or service you want and choose "e-layaway" as your payment
option. Our payment calculator makes it easy for you to set up your
payment terms.
3. Make Payments:
Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.
4. Receive Products:
Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.
More Buying Power:
*
Our lay-away plan offers a safe and affordable payment alternative
without tying up your credit or subjecting the purchase to high-interest
credit card fees.
No Credit Checks or Special Qualifications:
* Anyone 18 years old or older can join. All you need is an active bank account.
Freedom From Credit Cards:
*
If you are near or beyond your credit limit or simply want to avoid
high interest credit card fees, our e-layaway is the smart choice for
you.
Flexible Payment Schedules:
*
Similar to traditional layaway, e-layaway lets you make regular payments
towards merchandise, with delivery upon payment in full. Payments are
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment®
A Tool for Planning Ahead:
*
Our e-layaway makes it easy for smart shoppers like you to plan ahead
and buy items such as bug detectors, nanny cameras, audio bugs, gps
trackers, and more!
No Hidden Charges or Mounting Interest:
Our
e-layaway makes shopping painless by eliminating hidden charges and
monthly interest fees. Our customers pay a flat transaction fee on the
initial purchase price.
NO RISK:
* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.
Security and Identity Protection:
DPL-Surveillance-Equipment
has partnered with trusted experts like McAfee and IDology to ensure
the security and integrity of every transaction. Identity verification
measures are integrated into our e-layaway system to prevent fraudulent
purchases.
Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart
DPL-Surveillance-Equipment.com
is a world leader in providing surveillance and security products and
services to Government, Law Enforcement, Private Investigators, small
and large companies worldwide. We have one of the largest varieties of
state-of-the-art surveillance and counter-surveillance equipment
including Personal Protection
and Bug Detection Products.
Buy, rent or lease the same
state-of-the-art surveillance and security equipment Detectives, PI's,
the CIA and FBI use. Take back control!
DPL-Surveillance-Equipment.com
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
Twitter
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
0 Comments:
Post a Comment
Note: Only a member of this blog may post a comment.
<< Home