Reference client for Bitmessage: a P2P encrypted decentralised communication protocol:
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Jonathan Warren c424885734 Update statuses of sent broadcasts seperately even if all sent data is identical for two messages 9 years ago
archpackage Changed version to 0.3.5 9 years ago
debian Changed version to 0.3.5 9 years ago
desktop Packaging for multiple distros 10 years ago
ebuildpackage -aChanged version to 0.3.5 9 years ago
man Packaging for multiple distros 10 years ago
puppypackage -aChanged version to 0.3.5 9 years ago
rpmpackage Changed version to 0.3.5 9 years ago
slackpackage Packaging for multiple distros 10 years ago
src Update statuses of sent broadcasts seperately even if all sent data is identical for two messages 9 years ago
.gitignore Adding src/.settings/ to .gitignore (for Eclipse developers) 10 years ago
COPYING Debian packaging 10 years ago
LICENSE Debian packaging 10 years ago
Makefile Increment version number to 0.3.5 9 years ago
README.md Debian packaging 10 years ago
arch.sh Changed version to 0.3.5 9 years ago
configure Packaging for multiple distros 10 years ago
debian.sh Changed version to 0.3.5 9 years ago
ebuild.sh Changed version to 0.3.5 9 years ago
generate.sh Changed version to 0.3.5 9 years ago
osx.sh Generated py for search. 10 years ago
puppy.sh Changed version to 0.3.5 9 years ago
rpm.sh Changed version to 0.3.5 9 years ago
slack.sh Changed version to 0.3.5 9 years ago

README.md

PyBitmessage

Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs.

references