Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"The medium is the message." -- Marshall McLuhan


computers / rocksolid.shared.general / The Anonymous Bitmessage Broadcast Feature

SubjectAuthor
o The Anonymous Bitmessage Broadcast FeatureBitmessage Broadcast

1
The Anonymous Bitmessage Broadcast Feature

<tue456$25e3$1@news.cyber23.de>

 copy mid

https://novabbs.com/computers/article-flat.php?id=705&group=rocksolid.shared.general#705

 copy link   Newsgroups: alt.privacy.anon-server rocksolid.shared.general
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.cyber23.de!.POSTED!not-for-mail
From: bitmess...@broadcast.invalid (Bitmessage Broadcast)
Newsgroups: alt.privacy.anon-server,rocksolid.shared.general
Subject: The Anonymous Bitmessage Broadcast Feature
Date: Thu, 9 Mar 2023 20:20:23 -0600
Organization: Cyber23 news
Message-ID: <tue456$25e3$1@news.cyber23.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 Mar 2023 02:20:23 -0000 (UTC)
Injection-Info: news.cyber23.de;
logging-data="71107"; mail-complaints-to="abuse@cyber23.de"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.8.0
Content-Language: en-US
 by: Bitmessage Broadcast - Fri, 10 Mar 2023 02:20 UTC

The Anonymous Bitmessage Broadcast Feature
==========================================

(site link: https://bitmessage.org)

The Bitmessage broadcast feature is a strongly anonymous broadcast or
blogging method. It is highly resistant to any level of nation-state
censorship effort. When used over a anonymizing network like Tor or I2P,
the Bitmessage broadcast is significantly more secure than Freenet, I2P,
or a Tor hidden service alone.

When the user creates a Bitmessage address, the user can 'broadcast'
messages from that address. In the 'send' window, the user selects 'send
message to your subscribers' instead of 'send ordinary message.'

By sending a broadcast the program places an encrypted payload of the
outgoing message onto the network. The encrypted payload is then
randomly routed to all peers in the network. Only those users who know
the broadcast address are able to decrypt and receive the broadcast.

In short the message is encrypted and randomly routed and only people
with the key can decode the message. It is just random gibberish to
everyone else.

When using Bitmessage over the Tor Onion network, this creates a highly
anonymous and untraceable method of blogging or sending out alerts to a
group of subscribers. The sender can be sure that nobody can unmask
their IP address or identity.

Another nice feature is that anti-spam is built in to the broadcast
feature. If a user does not want to receive the broadcast any more they
just unsubscribe and the sender can no longer broadcast to that user.

Yet another nice feature is the broadcaster has no way of knowing who is
subscribed to the broadcast. Since it is a passive message broadcast
operation, and users must decrypt the message locally, the sender has no
way to know who is and who is not decrypting the message. So if the
sender publishes a broadcast address, and fifty users subscribe, it is
impossible for the sender to know who is subscribed. This promotes
anonymity for everyone involved, not just the sender.

I recommend that the user install Bitmessage into a jail, container, or
virtual machine for added security against malicious attacks, and always
use a Tor proxy to connect to the Bitmessage network. This hardens
against hacker attempts to compromise the user's privacy or file system.
Since anonymous protocols are subject to constant attack, it is always
good practice to install them in some kind of software or hardware jail.

Hackers, hacktivists, journalists, whistleblowers, persecuted persons,
and even intelligence and law enforcement agents can benefit from using
the Bitmessage broadcast feature. Because it is highly resistant to
monitoring and censorship they can be sure their messages will be
delivered and both sender and recipient cannot be linked by any metadata.

Even if some future advances in cryptography are able to break current
cryptography, coded messages would still be a safe bet. If using coded
messages without identifying names in them, there is absolutely no way
to link the sender to the recipient(s) even if all the messages on the
network were somehow decrypted. Even if an attacker were able to break
all cryptography and decrypt past messages they would have no way of
knowing who sent a broadcast or who received it.

1
server_pubkey.txt

rocksolid light 0.9.7
clearnet tor