top | item 6866481

Bitmessage – Send messages without leaking metadata

85 points| 3pt14159 | 12 years ago |bitmessage.org

64 comments

order
[+] natch|12 years ago|reply
Nice. One feedback for the maintainer of the OS X instructions: in the compile from source section, instead of giving the command line for installing homebrew (which by the way renders incorrectly with an emoticon on that wiki page) the best practice is to provide a link to the homebrew project page, because the command line may change, and because they don't want things like typos or emoticons getting in the way of people getting brew installed.
[+] SectioAurea|12 years ago|reply
This is an excellent point. I know I've been guilty of the pattern: "provide detailed directions for a poorly documented build, then spend years maintaining them in blog post/comments".

Better would be to actually contribute to central project documentation, I suppose.

[+] ma_mazmaz|12 years ago|reply
According to the white paper, "all users receive all messages." How, then is the system scalable to a large network?
[+] benregenspan|12 years ago|reply
The whitepaper proposes to handle this by having nodes join separate clusters once their databases reach a certain size.
[+] Ihmahr|12 years ago|reply
They have some vague ideas for scalability that they do not know how to implement.

Also they have some major security issues that I pointed out to them, but they simply ignored. I am sure bitmessage will never be a success because it is fundamentally broken.

[+] fundamental|12 years ago|reply
From what I can tell, it would appear that this system is still vulnerable to some level of traffic analysis. Last I checked the messages are identical as they are sent around the network, so it should be possible to observe the origin of a message by observing the first node to transmit that binary string. A similar approach could be used to identify receivers if the acknowledge messages are enabled. While this doesn't get you the content of the messages it does leak some information about the sender and receiver which bitmessage should be hiding. This level of traffic analysis might seem unrealistic, but there doesn't seem to be a good way to detect 'evil' clients which could watch a large portion of the total network without too much resources (in theory).

There are some recommendations on the other forums about using tor to make this information less useful, but that is not what the system uses by default.

[+] chongli|12 years ago|reply
All users receive all messages. The only sort of traffic analysis you can do with this is to harvest all of the peers. You have no idea who is sending messages to whom.
[+] Paperweight|12 years ago|reply
Have a messaging system that implements per-MB fees in order to support the network. The transaction has to be signed by the sender, receiver, and burdened nodes. BOOM no spam.
[+] Atheros|12 years ago|reply
No one is willing to pay money to send messages. I even proposed Satoshi Nakamoto's idea (possibly other earlier peoples' idea) to require paying to send a message but receiving money to receive a message and no one would accept even that idea.
[+] al2o3cr|12 years ago|reply
...and "BOOM" the whole no-metadata thing as well. See also the craziness with tracking Bitcoins from wallet-to-wallet recently.
[+] infruset|12 years ago|reply
then couldn't we just use the Bitcoin protocol for sending messages?
[+] mahyarm|12 years ago|reply
Bitmessage is not mobile practical due to the hash cash requirements, unless you have a main 'mail' server and use the mobile client as a thin client.
[+] infruset|12 years ago|reply
Now, if this is scalable as the authors claim, wouldn't this be a nice vehicle for a decentralized facebook? I can see at least an issue, which is that large files (i.e pictures, videos) can be transferred but they would have to be stored on the hard drive of anyone who wants to keep having access to it. What do you think?
[+] infruset|12 years ago|reply
I just installed it. How do you give an address to people without disclosing it to the whole world if they don't have PGP?

This is one of my addresses, I feel lonely HN :-) BM-2cUHuH7sJdt3GchrqSikvzWP4w7Vm2cjhK (so much for not disclosing to the whole world, but this is just for fun)

[+] slashdotaccount|12 years ago|reply
Bitmessage addresses aren't secret. They are even being broadcasted to the P2P network when you create them. Of course, one can keep in secret (by not announcing it) that he/she owns a particular Bitmessage address but the addresses themselves are not secret.
[+] p4bl0|12 years ago|reply
I read a while back that BitMessage's security is easily breakable. See http://secupost.net/3240982275/bitmessage-security.
[+] dmunoz|12 years ago|reply
This relied on being able to send lots of messages, and having the user visit a link contained in them. The first issue can be fixed by upping the proof of work required to send a message, although this will not stop a determined attacker who has lots of cycles to throw at the problem. As for the second issue, users should not be visiting links from addresses they do not trust. As with most anonymity systems, it is only as good as you treat it.
[+] 3pt14159|12 years ago|reply
Not really security, more like spam prevention and idiots clicking links.