2
0
mirror of https://github.com/ComradCollective/Comrad synced 2024-11-01 21:40:32 +00:00
This commit is contained in:
quadrismegistus 2020-08-23 21:27:40 +01:00
parent 99884a9bf7
commit 79f9683c89

View File

@ -17,15 +17,11 @@ All of your data is strongly encrypted, and only you and those you choose will b
### Decentralized ### Decentralized
Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to store its data and communicate across the network. Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to 'flood' encrypted data across the network.
By "flooding" this network with redundant copies of the same information, but encrypted only for the right people, Komrade improves both the security and the privacy of all information on the network.
### Anonymous ### Anonymous
It's impossible to tell who or sent what to anyone. All peers in the network share data randomly, but only the intended recipients have the right decryption key to unlock it. This is a different kind a different kind of cloud: more like a 'dust storm' of strongly encrypted information. It's impossible to tell who or sent what to anyone. All peers in the network share data randomly, but only the intended recipients have the right decryption key to unlock it. This is a different kind a different kind of cloud: more like a 'dust storm' of strongly encrypted information. Ideally, for extra anonymity, all network traffic is also routed through Tor (a global maze of computers which hides your footprints), though this currently faces some serious technical challenges.
<small>For an extra layer of anonymity, ideally we can route all communication over Tor, although this seems to be incompatible with the UDP connections required by the P2P network. (Need help on this.)</small>
### Unmonetizable ### Unmonetizable