mirror of
https://github.com/ComradCollective/Comrad
synced 2024-11-01 21:40:32 +00:00
md
This commit is contained in:
parent
99884a9bf7
commit
79f9683c89
@ -17,15 +17,11 @@ All of your data is strongly encrypted, and only you and those you choose will b
|
||||
|
||||
### Decentralized
|
||||
|
||||
Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to store its data and communicate across the network.
|
||||
|
||||
By "flooding" this network with redundant copies of the same information, but encrypted only for the right people, Komrade improves both the security and the privacy of all information on the network.
|
||||
Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to 'flood' encrypted data across the network.
|
||||
|
||||
### Anonymous
|
||||
|
||||
It's impossible to tell who or sent what to anyone. All peers in the network share data randomly, but only the intended recipients have the right decryption key to unlock it. This is a different kind a different kind of cloud: more like a 'dust storm' of strongly encrypted information.
|
||||
|
||||
<small>For an extra layer of anonymity, ideally we can route all communication over Tor, although this seems to be incompatible with the UDP connections required by the P2P network. (Need help on this.)</small>
|
||||
It's impossible to tell who or sent what to anyone. All peers in the network share data randomly, but only the intended recipients have the right decryption key to unlock it. This is a different kind a different kind of cloud: more like a 'dust storm' of strongly encrypted information. Ideally, for extra anonymity, all network traffic is also routed through Tor (a global maze of computers which hides your footprints), though this currently faces some serious technical challenges.
|
||||
|
||||
### Unmonetizable
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user