
Once he sees that there is a message with his own public key attached, he can then open it with his own private key and read what Alice wrote.Īt this point you might be thinking, this is WAY too complicated!įortunately, the entire Bitmessage process is fully automated, and all of these above steps are completed behind the scenes.
#Bitmessage download latest version download

It’s also encrypted with Bob’s public key. Automatically, her public key and private key signature are attached, proving that the message is from her. Let’s take a quick look at some basic steps to illustrate how BitMessage works: Instead of sending coins (like Bitcoin), Bitmessage allows you to send private and encrypted messages - making it a highly secure alternative to email. Similar to Bitcoin, it uses a proof of work (PoW) system to encrypt and randomize your information. This is why BitBay’s entire platform (minus its Proof of Stake 3.0 blockchain transactions) has been built upon a unique protocol called BitMessage.īitMessage is a decentralized communications protocol. So far, the only proven method for guaranteeing that a thief cannot steal everyone’s data is decentralization. When a large company stores 100 + million people’s information on a central server, it becomes a MASSIVE honeypot for hackers. It is also a weakness that grows with the scale of the network’s growth. It is both the place and the method of our personal information storage which ultimately creates such a security weakness.

Underneath all of those outlets, however, is one aspect that ultimately propagates this vulnerability. Every social media platform, messaging app, online merchant, financial institution and other outlets can be a “one-stop shop” for shady characters to break in and hijack our identities. Our personal (and financial) information gets spread throughout the internet around the clock. For many of us - that lack of privacy is unfortunately much more than a feeling. The global population is surging well past 7 Billion people and it may feel like our personal information is becoming increasingly difficult to keep private.
