Users do not know the intended recipient of messages. New messages are forwarded throughout the network, thus distributing all messages to all users running the software. Instead, each user’s client/software forms incoming and outgoing connections with a limited number of random clients. Bitmessage, similar to Bitcoin, runs on a decentralized distributed network, meaning that messages do not run through a central server. Instead of email addresses and passwords, users can generate 36 character addresses along with public keys (encryption keys) and private keys (decryption keys). Bitmessage allows users to send and receive encrypted messages. To offer an example, we’ll examine Bitmessage, a peer-to-peer communications protocol. Encrypted data is similarly decrypted using a decryption algorithm and a decryption key.
BITMESSAGE VS SERIES
The algorithm then applies its complex series of mathematical operations, potentially altered by the key, to the data. If the government cannot protect its own secrets, why trust it to protect yours?įirst, an encryption algorithm takes two inputs, the data to be encrypted and usually an encryption key. It’s not hard to imagine far less honorable government employees abusing their power for criminal gain. As Snowden admitted in his interview with Glenn Greenwald, it would have been quite lucrative for him to sell data to foreign intelligence agencies. A concentration of sensitive information is a treasure-trove for malicious hackers.Įven if the government thwarts all external attacks, consider how much data was available to leakers like Chelsea Manning and Edward Snowden. As a result, the Feds can easily access that data without a warrant by requesting it through a Foreign Intelligence Surveillance Act (FISA) request or National Security Letter (NSL).Ĭentralized data storage means you are always at riskīut what if someone has nothing to hide from the government? The NSA’s strategy of massive data mining and indefinite storage in centralized data centers still leaves many areas for concern. email, social networks, voice calls) operate through central service providers that store records of all user activity. Why? Consider the extent of NSA surveillance that was highlighted in the mid 2010s. Anyone who uses the internet should consider using strong encryption to safeguard personal information and private communications.