Adult hidden chat online dating stoke on trent area

This layer is responsible for that even transparent proxies with own CA certificates installed on the client cannot inspect or modify the communication (surely only if they didn't modify the chat client's source code - development of a browser extension and a smartphone app is planned).

Each of the user may communicate freely with any person, without spending a dime of their money.

They build up individual TLS connections with each other within a group, once again using ECDH (but now with Curve25519 curve) for key exchange and AES-256 (in CTR mode) for ciphering.

Most importantly their ECDH shared keys are XORed with the SHA-256 hashed group password, which results in that their communication cannot be deciphered via participants using another password - if multiple groups being created under the same name but with different passwords, then each group member will be visible only to the ones that entered with the common one.

The server's source code is available upon a well-founded request.

Fast elliptic-curve cryptography in a plain Java Script implementation.

Leave a Reply