SlideShare a Scribd company logo
Bitmessage:An Analysis
Vikram Reddy Pareddy
CSc 8222
Department of Computer Science, Georgia State University
Email
• SMTP – 1981
• Simple Protocol - designed mainly for academic and
government use.
• No data protection strategies included
SMTP
Improvements on SMTP
• Sender Policy Framework(SPF) – It is an email
validation system that tries to prevent spam by
detecting spoofing, by verifying sender’s IP address.
The domain administrators are expected to designate
hosts in that domain that are legitimate hosts.
• Domain Keys Identified Mail(DKIM) – It is a
method of associating a domain name to the email
message to make someone responsible for the email.
This responsibility is set by using digital signatures.
Secure Email
• PGP – 1991 – Phil Zimmerman
• It uses signing, encryption, certificates etc. to create
secure environments – for email or for encrypted file
systems etc.
• Public key authentication – decentralized
• Web of Trust
Web of Trust
Assumptions in Web of Trust
• In order to verify the key, the assumption made is
that everyone signs the key of others
• Also everyone submits these signatures to the key
servers.
Idea of PGP
Off the record messaging
• Cryptographic protocol used to provide strong
encryption for instant messaging and email
• It uses a combination of AES symmetric key
encryption, Diffie-Hellman key exchange, and SHA1 hash function.
Features of OTR systems
• Encryption
• Authentication
• Deniable Encryption
• Perfect Forward Secrecy
Invisible Internet Project
• Provides a layer that serves secure
communication/data transfer mechanism
• Introduced in 2003 as a beta software
• Not reviewed yet
• No anonymity guaranteed
Issues with protocols based on
SMTP
Bitcoin
• Open source decentralized Peer to Peer currency
• No central authority
• Not designed for anonymity
• Proof of work
• Mining
Bitmessage
• Based on Bitcoin, although it is designed to handle a
different application
• It differs from the protocols based on SMTP as it is
based on the concept of EGE or “Everyone Gets
Everything”
• Using this concept, Bitmessage can not only mask
the message body but also the metadata associated
with the message i.e. the sender and receiver
EGE
• No end points to a message
• Encrypt the message and drop it into the block chain
of messages
• All the active users try to decrypt the message.
• Only the intended recipient will be able to decrypt
the message.
Other services of Bitmessage
Broadcasting
•Since Bitmessage is based on the concept of EGE,
broadcasting a message comes naturally
•The users have to get the password of the channel
from some forum or word of mouth – and then they
will be able to decrypt the messages using the password
Chans
•Chans or channels are anonymous chat rooms
•Users can simply encrypt using the public key of the
chat room and post it
•Completely anonymous
Perfect Forward Secrecy
• An intruder can store all the encrypted conversations
and later when he eventually breaks or somehow
gets the private key, all the previously encrypted
information is lost
• This is a concern in almost all the PKI systems
• In Bitmessage this concern is even more pronounced
as anyone can store the block chains easily
• Bitmessage doesn’t provide PFS
• However, this can be supported in Bitmessage using
and implementation of key rotation
• Every message that is sent has to be sent using a new
key. These are called ephemeral keys
Message Retention
• In Bitmessage, the messages are retained for two
days before they are deleted
• The sender expects an acknowledgement from the
receiver which confirms the delivery of the message
• If the receiver doesn’t check his mailbox in two days
that the message was sent, the messae is lost and the
sender has to send it again
This concept is being improved using the Time-to-live
concept
Streams
• According to Prof. Tom Rodden of Univ of
Nottingham, 2.8 million mails are being sent per
second across the world.
• If Bitmessage is expected to store all these messages,
it has to implement some concept compared to the
normal block chain used by bitcoin
• For this, Bitmessage uses Streams.
• Streams are a way to self-segregate the messages
when the volume of the messages is too high
• When the volume of messages become too high, the
client can divide the block chain into child streams
• Problem: Inter stream messaging is not possible in
Bitmessage.
• If the receiver of the message is in a different stream,
the sender has to create an address in that other
stream in order to send the message.
Conclusion
• Bitmessage completely redesigns the email system
• It is completely anonymous
• There are a few issues that still exist such as Perfect
Forward Secrecy and the question of scalability
Future Work
• An MIT graduate has developed a new protocol
based on Bitmessage
• This message is called Bitmask or Bitmessage 2.0.
This protocol uses bandwidth based metrics instead
of proof of work
• A protocol called LibertyMail is being developed
which is again based on Bitmessage system
Idea
• Currently, Bitmessage, like bitcoin in the beginning
has only one client, Bitmessage-Qt
• This is a standalone client in the system which is
used independent of any mail client
• The problem with this kind of client is that it
downloads all the block chain into the individual
system
• While this is a hindrance only when downloading
the client for the first time, it is still a hindrance
• Bitcoin overcomes this hindrance by using a thin
client based architecture
• Electrum is an example
• Electrum has its multiple servers located across the
world.
• A person who wants to use a bitcoin client can
generate the keys on his local machine and send it to
the electrum server which posts it onto the block
chain
• Electrum uses passphrase based electrum client that
creates deterministic addresses based on the seed
value.
• The idea of my project is to use a similar
architecture in Bitmessage.
• Using this architecture, we can still mask the
metadata
References

More Related Content

Similar to Bitmessage

Electronic mail
Electronic mailElectronic mail
grade 6.pptx
grade 6.pptxgrade 6.pptx
grade 6.pptx
Manisha367566
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Email sec11
Email sec11Email sec11
Email sec11
Athira Asakumar
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
Kabul Education University
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
georgejustymirobi1
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5limsh
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
AmnaNadeem27
 
MQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoTMQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoT
Alejandro Martín Clemente
 
Email
EmailEmail
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
Damien Magoni
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)
Matthew Chang
 
Mqtt
MqttMqtt
Mqtt
abinaya m
 

Similar to Bitmessage (20)

Electronic mail
Electronic mailElectronic mail
Electronic mail
 
grade 6.pptx
grade 6.pptxgrade 6.pptx
grade 6.pptx
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Email sec11
Email sec11Email sec11
Email sec11
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
Pgp1
Pgp1Pgp1
Pgp1
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Email security
Email securityEmail security
Email security
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
MQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoTMQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoT
 
Email
EmailEmail
Email
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
Digital Certified Mail (PPT)
Digital Certified Mail (PPT)Digital Certified Mail (PPT)
Digital Certified Mail (PPT)
 
Mqtt
MqttMqtt
Mqtt
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Bitmessage

  • 1. Bitmessage:An Analysis Vikram Reddy Pareddy CSc 8222 Department of Computer Science, Georgia State University
  • 2. Email • SMTP – 1981 • Simple Protocol - designed mainly for academic and government use. • No data protection strategies included
  • 4. Improvements on SMTP • Sender Policy Framework(SPF) – It is an email validation system that tries to prevent spam by detecting spoofing, by verifying sender’s IP address. The domain administrators are expected to designate hosts in that domain that are legitimate hosts. • Domain Keys Identified Mail(DKIM) – It is a method of associating a domain name to the email message to make someone responsible for the email. This responsibility is set by using digital signatures.
  • 5. Secure Email • PGP – 1991 – Phil Zimmerman • It uses signing, encryption, certificates etc. to create secure environments – for email or for encrypted file systems etc. • Public key authentication – decentralized • Web of Trust
  • 7. Assumptions in Web of Trust • In order to verify the key, the assumption made is that everyone signs the key of others • Also everyone submits these signatures to the key servers.
  • 9. Off the record messaging • Cryptographic protocol used to provide strong encryption for instant messaging and email • It uses a combination of AES symmetric key encryption, Diffie-Hellman key exchange, and SHA1 hash function.
  • 10. Features of OTR systems • Encryption • Authentication • Deniable Encryption • Perfect Forward Secrecy
  • 11. Invisible Internet Project • Provides a layer that serves secure communication/data transfer mechanism • Introduced in 2003 as a beta software • Not reviewed yet • No anonymity guaranteed
  • 12. Issues with protocols based on SMTP
  • 13. Bitcoin • Open source decentralized Peer to Peer currency • No central authority • Not designed for anonymity • Proof of work • Mining
  • 14. Bitmessage • Based on Bitcoin, although it is designed to handle a different application • It differs from the protocols based on SMTP as it is based on the concept of EGE or “Everyone Gets Everything” • Using this concept, Bitmessage can not only mask the message body but also the metadata associated with the message i.e. the sender and receiver
  • 15. EGE • No end points to a message • Encrypt the message and drop it into the block chain of messages • All the active users try to decrypt the message. • Only the intended recipient will be able to decrypt the message.
  • 16. Other services of Bitmessage Broadcasting •Since Bitmessage is based on the concept of EGE, broadcasting a message comes naturally •The users have to get the password of the channel from some forum or word of mouth – and then they will be able to decrypt the messages using the password
  • 17. Chans •Chans or channels are anonymous chat rooms •Users can simply encrypt using the public key of the chat room and post it •Completely anonymous
  • 18. Perfect Forward Secrecy • An intruder can store all the encrypted conversations and later when he eventually breaks or somehow gets the private key, all the previously encrypted information is lost • This is a concern in almost all the PKI systems • In Bitmessage this concern is even more pronounced as anyone can store the block chains easily
  • 19. • Bitmessage doesn’t provide PFS • However, this can be supported in Bitmessage using and implementation of key rotation • Every message that is sent has to be sent using a new key. These are called ephemeral keys
  • 20. Message Retention • In Bitmessage, the messages are retained for two days before they are deleted • The sender expects an acknowledgement from the receiver which confirms the delivery of the message • If the receiver doesn’t check his mailbox in two days that the message was sent, the messae is lost and the sender has to send it again This concept is being improved using the Time-to-live concept
  • 21. Streams • According to Prof. Tom Rodden of Univ of Nottingham, 2.8 million mails are being sent per second across the world. • If Bitmessage is expected to store all these messages, it has to implement some concept compared to the normal block chain used by bitcoin • For this, Bitmessage uses Streams. • Streams are a way to self-segregate the messages when the volume of the messages is too high
  • 22. • When the volume of messages become too high, the client can divide the block chain into child streams • Problem: Inter stream messaging is not possible in Bitmessage. • If the receiver of the message is in a different stream, the sender has to create an address in that other stream in order to send the message.
  • 23. Conclusion • Bitmessage completely redesigns the email system • It is completely anonymous • There are a few issues that still exist such as Perfect Forward Secrecy and the question of scalability
  • 24. Future Work • An MIT graduate has developed a new protocol based on Bitmessage • This message is called Bitmask or Bitmessage 2.0. This protocol uses bandwidth based metrics instead of proof of work • A protocol called LibertyMail is being developed which is again based on Bitmessage system
  • 25. Idea • Currently, Bitmessage, like bitcoin in the beginning has only one client, Bitmessage-Qt • This is a standalone client in the system which is used independent of any mail client • The problem with this kind of client is that it downloads all the block chain into the individual system • While this is a hindrance only when downloading the client for the first time, it is still a hindrance
  • 26. • Bitcoin overcomes this hindrance by using a thin client based architecture • Electrum is an example • Electrum has its multiple servers located across the world. • A person who wants to use a bitcoin client can generate the keys on his local machine and send it to the electrum server which posts it onto the block chain
  • 27. • Electrum uses passphrase based electrum client that creates deterministic addresses based on the seed value. • The idea of my project is to use a similar architecture in Bitmessage. • Using this architecture, we can still mask the metadata