![]() ![]() negative: mobile number required (SMS sending/receiving).decentralization: direct (P2P, no separate servers required).… > more > here << Silenceįederated via TC providers and works on the basis of SMS. This is all true, but while servers are not required, they are still used in five specific cases: push notifications, the OpenDHT proxy, bootstrap, name server, and TURN. There are many advantages associated with that, including increased privacy, light infrastructure, high scalability, no bandwidth restriction (other than that of your Internet connection), no size limit for file transfers, and more. We keep saying that Jami’s most distinctive and innovative characteristic is the fact that it doesn’t require a server to relay data between users. It uses SRTP to transfer communication data. It is both a peer-to-peer voice-over-IP client program and a custom protocol for service discovery using a distributed hash table (DHT). ![]() There is (as of March 2020) no version for the Pinephone. Jami is cross-platform, with versions for Android, FreeBSD, iOS, iPhone, Linux, Microsoft Windows, and OS X. Jami is a peer-to-peer system it does not rely on or require central servers. Jami is a good choice for secure phone calls over the Internet, as long as the people on the call are also using Jami. It also allows teleconferencing and videoconferencing, but strangely no text-based chatrooms yet, as the developers are trying to make these fully decentralized. Jami enables secure text, voice and video communication over the Internet. Originally developed for telephony (audio / audio and video / audio and video in groups, depending on the operating system), but text messaging is also possible text-based chat rooms are being worked on. More information: > here > here “Ring” -> “Jami”. negative: ONLY usable on PC/laptop - NOT on smartphones.decentralization: direct/ mesh (P2P, no separate servers).Sends to ALL participants, only the recipient can decrypt and read message (no sender/recipient address). negative: the protocol (external) is not yet properly documented!.positive: uses Signal protocol for encryption.decentralization: direct, uses TOR (P2P, no separate servers).Note: Oversec is probably not actively developed anymore since 2019 / it does not respond to Github-issues anymore. So security-minded people should definitely take a look at this app!ĭownload: at F-Droid (external) or directly as APK: (external) Sounds crazy, but it’s not and works great. This app virtually overlays others and encrypts/decrypts inputs before they are in the actual messenger. Regardless of the solution used, the app “Oversec” can also be used on Android devices. They are enormously helpful and therefore worth their weight in gold. Good translations make a product in general (here: Messenger) interesting and accessible to the masses, because you save many interested people/users unnecessary translation effort. Information should be understood by every native speaker and unnecessary misunderstandings due to insufficient translations should be avoided. Why? It would be arrogant to assume that “everyone” understands English or even to demand basic knowledge. In the following overview, a German website is rated as positive and a lack of German-language information as negative. delivery of offline messages is not possible without an additional intermediate station (“mailbox”).multi-device capability is extremely difficult to realize in P2P systems without additional servers as intermediate stations.battery consumption on mobile devices is higher than with server-based systems.Mesh/P2P systems can usually be used without costs (don’t forget donations/development orders!).Even though little information has been collected on some of these, they should not be neglected.Īgain and again “P2P” and “anonymous” will jump in the eye in the following - in addition the following explanations: P2P / Anonymity. In addition to the systems listed in system comparison, there are many other interesting projects, a few of which are listed here. Reading time: 7 minutes / whole rubric: 35 minutes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |