Bitmessage

PyBitmessage
Original author(s)Jonathan Warren
Developer(s)Bitmessage Community
Initial releaseNovember 2012; 12 years ago (2012-11)
Stable release
0.6.3.2 / February 13, 2018; 6 years ago (2018-02-13)
Written inPython, C++ (POW function)
Operating systemWindows, macOS, Linux, FreeBSD
Available inEnglish, Esperanto, French, German, Spanish, Russian, Norwegian, Arabic, Chinese
TypeInstant messaging client
LicenseMIT
Websitebitmessage.org

Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communications protocol that can be used by one person to send encrypted messages to another person, or to multiple subscribers.

Bitmessage was conceived by software developer Jonathan Warren, who based its design on the decentralized digital currency, Bitcoin. The software was released in November 2012 under the MIT license.[1]

Bitmessage gained a reputation for being out of reach of warrantless wiretapping conducted by the National Security Agency (NSA), due to the decentralized nature of the protocol, and its encryption being difficult to crack. This prevents the accidental eavesdropping.[2] As a result, downloads of the Bitmessage program increased fivefold during June 2013, after news broke of classified email surveillance activities conducted by the NSA.[1]

It achieves anonymity and privacy by relying on the blockchain flooding propagation mechanism and asymmetric encryption algorithm.[2]

Bitmessage has also been mentioned as an experimental alternative to email by Popular Science[3] and CNET.[4]

Some ransomware programs instruct affected users to use Bitmessage to communicate with the attackers.[5]

PyBitmessage version 0.6.2 (March 1, 2017) had a remote code execution vulnerability. It was fixed in version 0.6.3 (February 13, 2018).[6][7]

References

[edit]
  1. ^ a b Max Raskin (2013-06-27). "Bitmessage's NSA-Proof E-Mail". Business Week. Archived from the original on June 29, 2013.
  2. ^ a b Shi, Liucheng; Guo, Zhaozhong; Xu, Maozhi (2021). "Bitmessage Plus: A Blockchain-Based Communication Protocol With High Practicality". IEEE Access. 9: 21618–21626. doi:10.1109/ACCESS.2021.3056135. ISSN 2169-3536. S2CID 231851942.
  3. ^ Dan Nosowitz (2013-08-09). "What Are Your Options Now For Secure Email?". Popular Science.
  4. ^ Molly Wood (2013-08-13). "Gmail: You weren't really expecting privacy, were you?". CNet.
  5. ^ "Chimera Ransomware Tries To Turn Malware Victims Into Cybercriminals". International Business Times. 2015-12-04.
  6. ^ "CVE - CVE-2018-1000070". cve.mitre.org. Retrieved 2022-05-09.
  7. ^ "Fix message encoding bug · Bitmessage/PyBitmessage@3a8016d". GitHub. Retrieved 2022-05-09.

Further reading

[edit]
[edit]