2
0
mirror of https://github.com/ComradCollective/Comrad synced 2024-11-01 21:40:32 +00:00
This commit is contained in:
quadrismegistus 2020-08-23 21:17:28 +01:00
parent 37092ded0e
commit 99884a9bf7

View File

@ -17,13 +17,15 @@ All of your data is strongly encrypted, and only you and those you choose will b
### Decentralized
Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to store its data and communicate across the network. By "flooding" the network redundant copies of (strongly encrypted) information, Komrade improves both the privacy, security, and longevity of that information.
Komrade doesn't live on a server, but rather in the ether between all the devices curently running Komrade. Rather than the hierarchical server/client relationship, which exposes the entire network to attacks on a central server, and expose the anonymity on both parties, Komrade uses peer-to-peer networking to store its data and communicate across the network.
By "flooding" this network with redundant copies of the same information, but encrypted only for the right people, Komrade improves both the security and the privacy of all information on the network.
### Anonymous
It's literally impossible to tell who or sent what to anyone. (Some encryption methods can supposedly withstand quantum computers.) All peers in the network share all data randomly; but only the intended recipients have the right decryption key to unlock it. Anonymity is created by creating a different kind of cloud: more like a 'dust storm' of strongly encrypted information.
It's impossible to tell who or sent what to anyone. All peers in the network share data randomly, but only the intended recipients have the right decryption key to unlock it. This is a different kind a different kind of cloud: more like a 'dust storm' of strongly encrypted information.
For an extra layer of anonymity, ideally we can route all communication over Tor, although this seems to be incompatible with the UDP connections required by the P2P network. (Need help on this.)
<small>For an extra layer of anonymity, ideally we can route all communication over Tor, although this seems to be incompatible with the UDP connections required by the P2P network. (Need help on this.)</small>
### Unmonetizable