So i got this idea, with ppl all concerned with privacy, why not program a network (and a client/app to use it), that uses key encryption and a proxy sever. I know MIT runs a keyserver, but it is practically just a database, there is no graphical way to search for users or send messages, and there is no infrastructure for irl-like channels
So it would work like this:
- The client would establish a secure connection to the server
- The cleint would push, via the secure connections, a run-time generated public key, as well as a user name, and a password, if this account is registered.
- The cleint can now send private messages to any other client on the network, using the keyserver as a proxy (no p2p so you cant see ppl's IPs
The ability to use channels will be integrated onto the cleint, but channals will not be handled by the server. Channals will be run by first and third party bots connected to the network. There will no be guarantee the channels will not log your messages (or someone connected to the channel, but because all data is still proxied via the keyserver, the channel bots cannot know your ip). So basically, channels are bots that act like other users and proxies PMs sent to them to all who 'subscribed' to them.
If i do this, i will need ppl to help, especialy to port the java client to other platforms like android and ios.
Im not sure i get the idea
Can't Whatsapp, Telegram and SSL websites do the job?
That's pretty much what Telegram do, something like that.
Just because something already exists, that doesn't mean you should not fruit your ideas :P
Could someone describe Telagram? Also, isn't Telagram p2p?
I think Telegram has a client-server based network. I heard decentralized servers are coming though.
Telegram is supposedly encrypted. The downside is that ISIS uses it, though. But that's what happens with anonymity and encrypted networks. Also Telegram is a chat medium like Yahoo Messenger, IRC, Whatsapp, Skype, etc.
Quote from: DJ Omnimaga on November 28, 2015, 07:39:56 am
The downside is that ISIS uses it, though.
They do? O.O I though they would use more secure things like that i²p thing.
Yeah, perhaps they don't know about it yet or they already use it as well. The only way to stop them fast is to shut down Internet and phone communications worldwide. :P