Reference client for Bitmessage: a P2P encrypted decentralised communication protocol:
Go to file
Jonathan Warren 5c93835f09 Merge pull request #321 from neko259/master
Use system text color for enabled addresses instead of black
2013-07-23 13:20:18 -07:00
archpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
debian manual merge 2013-07-23 15:36:12 -04:00
desktop Packaging for multiple distros 2013-07-12 10:36:28 +01:00
ebuildpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
man Packaging for multiple distros 2013-07-12 10:36:28 +01:00
puppypackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
rpmpackage Improving the Ebuild 2013-07-23 16:04:44 +01:00
slackpackage Packaging for multiple distros 2013-07-12 10:36:28 +01:00
src Merge pull request #321 from neko259/master 2013-07-23 13:20:18 -07:00
.gitignore Adding src/.settings/ to .gitignore (for Eclipse developers) 2013-06-23 21:17:34 +01:00
arch.sh Some Arch dependencies 2013-07-12 14:03:11 +01:00
configure Packaging for multiple distros 2013-07-12 10:36:28 +01:00
COPYING Debian packaging 2013-04-01 20:23:32 +01:00
debian.sh manual merge 2013-07-14 16:35:16 -04:00
ebuild.sh Packaging for multiple distros 2013-07-12 10:36:28 +01:00
generate.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00
LICENSE Debian packaging 2013-04-01 20:23:32 +01:00
Makefile Improving the Ebuild 2013-07-23 16:04:44 +01:00
osx.sh Generated py for search. 2013-07-12 02:01:33 -04:00
puppy.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00
README.md Debian packaging 2013-04-01 20:23:32 +01:00
rpm.sh Packaging for multiple distros 2013-07-12 10:36:28 +01:00
slack.sh Improving the Ebuild 2013-07-23 16:04:44 +01:00

PyBitmessage

Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs.

references