Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Privacy

New BitTorrent Peer 2 Peer chat in development

Paul Anderson by Paul Anderson
December 19, 2013 - Updated on January 11, 2014
in Privacy, Public, Technology News
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

BitTorrent, a popular Peer 2 Peer (P2P) torrent client is creating a serverless instant messaging system that depends on public key encryption to shield the privacy of communications, distinguishing people by only cryptographic key pairs.

You might also like

Chrome Browser Extension Vytal Prevents Privacy Leaks

Are Bluetooth signals being used to track smartphones?

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

This new project was announced in September and unveiled some information on how it will work in a blog post today. The blog post states:

With BitTorrent Chat, there aren’t any “usernames” per se. You don’t login in the classic sense. Instead, your identity is a cryptographic key pair. To everyone on the BitTorrent Chat network at large, you ARE your public key. This means that, if you want, you can use Chat without telling anyone who you are. Two users only need to exchange each other’s public keys to be able to chat.

Using public key encryption provides us with a number of benefits. The most obvious is the ability to encrypt messages to your sender using your private key and their public key. But in public key encryption, if someone gains access to your private key, all of your past (and future) messages could be decrypted and read. In Chat, we are implementing forward secrecy. Every time you begin a conversation with one of your contacts, a temporary encryption key will be generated. Using each of your keypairs, this key will be generated for this one conversation and that conversation only, and then deleted forever.

This system is really a Distributed Hash Table (DHT) which will finds IP addresses, eliminating the requirement of a main server to route communications, this company explained.

“If you understand the fundamentals of the DHT, you might be wondering, ‘How is a DHT more secure? Aren’t you giving your IP address out to the entire DHT? That’s LESS secure than a central server!'” BitTorrent said. “With Chat, we are expanding on what we can use the DHT for. We have updated our DHT protocol to support encryption. The new DHT protocol enables users to find each other securely and privately.”

You are able to sign up now for the BitTorrent Chat private alpha.

BitTorrent, Inc. is not announcing when Chat is going to be readily available, but Averill, a spokes person for BitTorrent stated it will probably stick to a related development routine as BitTorrent Sync, a file syncing program, similar to Dropbox, but it depends on P2P technology. That might imply a non-public alpha testing stage could be accompanied by a public alpha a couple of months and finally a beta release a month or two following.

Tags: BittorrentBitTorrent ChatDropboxencryptionInstant messagingPeer to Peerprivacy
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

Are Bluetooth signals being used to track smartphones?

by Christi Rogalski
June 17, 2022
0
Bluetooth research leads to tracking

Can Bluetooth signals be used to track smartphones? Many people would say "No" to this question. However, a team of engineers at the University of California San Diego...

Read more

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

by Christi Rogalski
June 8, 2022
0
Apple app store security fraud

Apple has recently released statistics on the number of fraudulent and untrustworthy transactions that have passed through the Apple App Store in 2021. In combination, they have stopped...

Read more

Tails OS Developers Warn Users to not use their Operating System

by Kyle
May 28, 2022
0
Tails OS 5.0 zero-day

The developers of the popular Tails OS (operating system) are warning its users to cease use of their tool due to privacy concerns after the discovery of a...

Read more

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more
Next Post
DDoS Bot Targets Linux and Windows Machines

DDoS Bot Targets Linux and Windows Machines

Related News

Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Syslogk Linux Rootkit triggers with magic packets

Syslogk Linux Rootkit triggers with magic packets

June 19, 2022 - Updated on June 20, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.