Skip to content

Motivations

Bounteous edited this page May 24, 2019 · 8 revisions

What motivated to start this project was the need to create a service that offers to be able to transmit content in a safe way and without losing control of the data. This service does not offer anonymity, although only a username and credentials are necessary to use it. In the case of really needing anonymity for any reason, the application can be used on the TOR protocol without creating any kind of limitation.

Do not detract from other types of services that provide similar services, because this project is not about reinventing the wheel, but to cover certain aspects that applications that we use every day have not yet been implemented or are not completely transparent in its use.

The things done with love are motivating. That's why this project is part of me. I think that the current technology is more than enough to offer real security to the user, this is only achieved with transaction and with real facts and that you can be tested. That is why 100% of this service is open source, and if something characterizes the most important communities of free software is the ability of entrepreneurship to take the project in the right direction. Having clarified the basic aspects that have prompted the start of this project, it is time to describe in more detail that it is offered here.

Since before we have commented that it is a secure but not anonymous service, it is because it is a centralized application, that is, the possibility of interactivity between the users of centers in a central point is indispensable. It is the main service that authenticates each user and transmits the information that users want to be sent by a secure means and under their control.

When we talk about the user having control over their data, it is because they have the ability before starting a chat to choose the encryption system that they believe is most appropriate, depending on the sensitivity of the data. As is already well known, each encryption system has its advantages and disadvantages that the user has to know how to deal with.

As you may have understood in the previous point, the data that users encrypt locally and with their keys stored under their own control, are stored in a central server. This proves that the encrypted content that users have downloaded can be exploited by an attacker in case of accessing the main server and having obtained the decryption key that the user has under their control. This case is practically impossible, but to guarantee the non-dependence of a third party to transimit content, the possibility of storing user chats under a server that the user can possess under their control is offered. That is, it is possible for the user to configure a physical server in their home, office or wherever, so that the chats are only stored on that server that the user owns.