Bit Message vs Tor Chat reccommendations

Discussion in 'Bitmessage' started by Witch Doctor 01, Dec 20, 2014.


Tags:
  1. Witch Doctor 01

    Witch Doctor 01 Mojo Maker

    I noticed that several monkeys are using Bit Message.. I'm considering either Bit Message or Tor Chat... why should I choose one over the other? Why did you choose Bit Message?
    Recommendations?
     
  2. sec_monkey

    sec_monkey SM Security Administrator


    None ;)
     
  3. Dunerunner

    Dunerunner Brewery Monkey Moderator

    Bit Message... quite possibly one of the best encryption programs the NSA has ever developed....

    Just kidding, but don't fool yourself into thinking it is in any way, secure.
     
    sec_monkey likes this.
  4. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    @Dunerunner BitMessage is Open Source, so the Code is available to ANYONE, to look at. Where in the BitMessage Code, is this suspected BackDoor, or exploitable Hole? Inquiring Minds want to know?
     
    Dunerunner and sec_monkey like this.
  5. sec_monkey

    sec_monkey SM Security Administrator

    MonkeyChat is obviously the best ;)

    Not really
     
  6. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    Well, actually MonkeyChat, now, is about as secure as anything going, that is NOT end to End Encrypted, these days, as it runs on SSL between your computer and the Server, and from the Server to their computer. SSL encrypts those exchanges in both directions, using the SSL Certificate Published by Melbo. As long as the Server, itself is secure, the messages, are Secure. MonkeyChat Logs are clear every 24 Hours, so there is no long term records, kept.
    BitMessage is an End to End Encrypted Messaging System, so it has One Less point of vulnerability. CryptoCat is half way in between these two systems.

    If one wants to have Total SECURE Messaging, the One NEEDS to go clear up to OnePad.exe, where you are dealing with a virtually UnCrackable Coding System that is generated InHouse. If the Pad is SECURE, the Message is SECURE, Period.... and there is and never will be a system that can BruteForce the encryption.
     
    Last edited: Dec 20, 2014
    sec_monkey and Dunerunner like this.
  7. Dunerunner

    Dunerunner Brewery Monkey Moderator

    I guess I'm just so paranoid and at the same time trusting that my government counter intelligence alphabet agencies are able to decipher anything out there that it is hard believe there are any secure online communications methods. Shoot, terrorists then could use Bit Message to plot attacks and the NSA would be none the wiser! It just seems logical....
     
    sec_monkey likes this.
  8. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    I am under the opinion that BitMessage is SECURE enough, to make it NOT worth while to even try breaking it, unless there is Significant Intel that leads them to think it is worth expending the REQUIRED Resources, to do such a Crack. Certainly it can't be done in Real Time, no matter how big the SuperComputer may be... The way to keep your Comms SECURE with BitMessage, is to vary the Encryption Key used in every Message. This is why BitMessage generates 8 Keys, when you set it up. If you use a different Key for each message and rotate thru those 8, regularly, it truly complicates and Crack, they try. If you keep the Keys SECURE, on both ends, then you have SECURE Comms. If you need more then, ONEPAD is what you need....
     
  1. BenP
  2. survivalmonkey
  3. survivalmonkey
  4. survivalmonkey
  5. survivalmonkey
  6. survivalmonkey
  7. survivalmonkey
  8. survivalmonkey
  9. survivalmonkey
  10. survivalmonkey
  11. melbo
  12. melbo
  13. DarkLight
  14. 10brokenpromises
  15. melbo
  16. DarkLight
  17. kckndrgn
  18. melbo
survivalmonkey SSL seal        survivalmonkey.com warrant canary
17282WuJHksJ9798f34razfKbPATqTq9E7