Skip to content
clamoring edited this page Dec 29, 2017 · 13 revisions

Welcome to the Hushlist wiki 🚀🚀🚀!

About

Hushlist is a program which allows communicating via the cryptocurrency Hush. You can send messages to around 50 people simultaneously, allowing for encrypted mailing-list style messaging.

Hush is a fork of Zcash (which is a fork of Bitcoin), which allows transactions involving shielded addresses in addition to normal transparent Bitcoin addresses. This allows transactions without disclosing sender, receiver, message (or even that a message existed), or financial transaction amount.

Hushlist supports Hush and Zcash (mainnet and testnet). Komodo will be supported in the future, although it's not clear yet which versions.

Messages are encoded within the protocol that Hush uses (Zcash). This allows several important things to happen.

  • The type of traffic is obscured. A man-in-the-middle attack cannot tell if a transaction is a financial transaction, a conversation, or both.
  • It allows the conversation to be encrypted within the blockchain protocol itself, rather than encrypting the conversation as a separate piece. Because the (encrypted) message is publicly posted with the blockchain this guarantees a specific thing was said at a specific time to a specific person or group of people. All anyone needs is the key to unlock it.
  • Keys are tied to a specific send/receive address. Addresses are like email, you can create as many of them as you like as often as you like.

Use-case examples

  • Bob is a whistleblower but is on the fence about what and when to give information. Bob creates a “dead-man-trigger” which sends his private key to a confidant if he doesn’t check in at a specific time. Once the confidant receives that key they can then read the information.

  • Alice is an investigative journalist in a war zone worries her writing/research/laptops/hard drives will not make it back over the border with her because they will be stolen, destroyed, or fall into the wrong hands. So she sends herself a series of Hushlist messages, and then retrieves them once she is in a safe place again.

  • Alice has an agreement with Bob but Bob has not fulfilled his end. Alice now wants to publicly prove this since Bob is denying he knew about the agreement at a key time. Luckily for Alice, the conversation they had on the blockchain is proof he did.

A few technical details.

  • Hushlist is currently a command-line program (v1) utilizing the form field of the Zcash protocol (512 bytes). v2 will allow segmentation.
  • Certain features of Hushlist might require Remote Procedure Call (RPC) methods that only exist on the Hush or other certain chains, so the features of Hushlist available to you depend on which chain(s) you choose to use.
Clone this wiki locally