AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Retroshare android app4/3/2023 ![]() ![]() Since the absence of source code, we cannot check if some critical Retroshare characteristics are active. We want to warn that from this point, there is certainly speculation. What can happen to me if I install the app? No technology is 100% safe but reasonably safe, and that depends on its design and its users. That’s why we need to be careful with who we share our keys. It is a safe network on paper however, the human factor always is the weakest connecting link of any secure system. At the same time, they are connected to their trusted people’s networks to compose a vast network where a person can broadcast messages to all participants. Therefore, we have an application that turns a mobile device into a node of a network of people we trust. The encryption implemented technology (GPG) is known and tested. Also, messages can be signed using the private key to validate a known public key sends them. As we said earlier, messages are encrypted with the recipient’s public key, so that only could be read by the matching owner’s private key. They do to cipher messages and also to sign them. You probably wonder if these keys have more useful purposes. QR codes are a tool to interexchange keys since they often are long text chains too complicated to write them down manually. The network of trust loses its purpose if it’s not respected. But, how is trust established? That is the primary role of QR codes and why it’s so crucial to no to share them carelessly. But here, the network nodes are trusted people, each one with their own cryptographic identity, and the keys are not associated with their data. The network model works pretty close as BitTorrent or Bitcoin. ![]() The friends’ network of Retroshare allows spreading messages among them automatically, so all of them receive them. As well as IPFS, the technology used to replicate the 1O referendum website with no chance of censorship, the information is no centralized. Retroshare is designed to have no central server. In the case of messaging services, person A can use the public key of person B to encrypt a text that person B could decrypt with his/her private key. The box only can be opened with the correct key combination: the public one from one person and the private from the other. It accepts two keys, one we call public, and the other private, and each person has one of each one. But in the case of an asymmetrical key, the box has a particular lock. That would be symmetrical since both parties have the same key. One of them can close it, and the other one can open. Here is an example to make it more understandable. It is based on the principle of Trusted Network, exchanging keys, preferably in person. Retroshare is a free project that allows the creation of encrypted networks among friends to communicate, sharing files, videoconferences, etc. We are going to focus on something else, the core that has been already explained in social media and some mass media: Retroshare. Just point out, it is an application developed in Flutter and has parts in different languages. We are not going to get deep in technical aspects regarding the user’s interface and the interaction with the device’s hardware (camera, microphone, GPS, etc.). Or social platforms that are entirely private and bound to the arbitrary criteria of a company, like Twitter, that its business is the exploitation of personal data collected for advertising and other purposes. Like Telegram, that only the client is open. ![]() In spite of being far away from our ideal, it is better than other options. However, the message transmission system is free. In ordinary circumstances, that would be enough reason to reject its use for not knowing what the application can do precisely. We consider this tool will have on its hands the security of thousands of Catalan men and women, so it must be under the most rigorous scrutiny possible.īefore we begin, we strongly emphasize that the absence of the original font code has made difficult this task. But after the action of blocking the Prat airport, the entity surprised us with a new tool: an app, just for android, designed to coordinate pacific acts of civil disobedience.įrom Pirates de Catalunya want to explain its operation from what we could gather and observe collectively. This Tsunami has started on Telegram with replicas to Twitter. If 15M was the result of several Facebook groups, The new cycle started with court ruling regarding of the “Procés” that have been highlighted by the social media and instant messaging apps. It is published with pedagogical purpose and also to allow the citizens can make their own conclusions. Disclaimer: The following info is the result of the analysis and observation of the app distributed by Tsunami Democràtic. ![]()
0 Comments
Read More
Leave a Reply. |