Reference client for Bitmessage: a P2P encrypted decentralised communication protocol:
Go to file
2013-07-23 16:04:44 +01:00
archpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
debian Improving the Ebuild 2013-07-23 16:04:44 +01:00
desktop Packaging for multiple distros 2013-07-12 10:36:28 +01:00
ebuildpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
man Packaging for multiple distros 2013-07-12 10:36:28 +01:00
puppypackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
rpmpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
slackpackage Packaging for multiple distros 2013-07-12 10:36:28 +01:00
src Added exception handling for sound playing dependencies 2013-07-20 10:55:03 +01:00
.gitignore Adding src/.settings/ to .gitignore (for Eclipse developers) 2013-06-23 21:17:34 +01:00
arch.sh Some Arch dependencies 2013-07-12 14:03:11 +01:00
configure Packaging for multiple distros 2013-07-12 10:36:28 +01:00
COPYING Debian packaging 2013-04-01 20:23:32 +01:00
debian.sh Packaging for multiple distros 2013-07-12 10:36:28 +01:00
ebuild.sh Packaging for multiple distros 2013-07-12 10:36:28 +01:00
generate.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00
LICENSE Debian packaging 2013-04-01 20:23:32 +01:00
Makefile Improving the Ebuild 2013-07-23 16:04:44 +01:00
osx.sh Make sure libcrypto from brew is linked. In the resulting .app 2013-06-17 00:25:03 +02:00
puppy.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00
README.md Debian packaging 2013-04-01 20:23:32 +01:00
rpm.sh Packaging for multiple distros 2013-07-12 10:36:28 +01:00
slack.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00

PyBitmessage

Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs.

references