Berty is an open, secure, peer-to-peer, and zero trust messaging application

Berty is an open, secure, peer-to-peer, and zero trust messaging application

2022-12-12 0 1,585
Resource Number 49641 Last Updated 2025-02-21
¥ 0HKD Upgrade VIP
Download Now Matters needing attention
Can't download? Please contact customer service to submit a link error!
Value-added Service: Installation Guide Environment Configuration Secondary Development Template Modification Source Code Installation

The recommended Berty in this issue is an open, secure, offline first, peer-to-peer, and zero trust messaging application.

Berty is an open, secure, peer-to-peer, and zero trust messaging application插图

Berty’s characteristics

  • Security and Privacy: By default, messages are end-to-end encrypted metadata kept to a minimum. Creating an account does not require a phone number or email address, and its attributes can be preserved even when used on adversarial networks
  • Review elastic decentralization, distribution, point-to-point and serverless. With the help of BLE technology and mDNS, no Internet connection is required.
  • Open: Forever Free and Open Source

require

General React Native Requirements

  • Homemade or selected package manager
  • Node>=12. x
  • The yarn manager

IOS development requirements

  • Mac OS X
  • XCode(Latest stable version)

Android development requirements

  • Android application development environment, such as Android Studio
  • Android SDK,Enable the following feature (Tools –>SDK Manager in Android Studio code): SDK platform “Android 11.0 (R)” Android SDK build tool LLDBNDK version 23.1.7779620 (export ANDROID-NDK_COME=”$ANDROID_COME/ndk/23.1.7779620″) Create Android SDK command-line tool

Berty Intended for use as a daily messaging application. Nevertheless, its construction primarily serves the following use cases:

  • When you need to share sensitive information through untrusted networks, such as while traveling
  • If you want to communicate anonymously
  • If you want complete control over your data and therefore do not want to rely on third-party servers
  • In countries/regions that actively monitor and adjust their networks, restrict their use and review certain content
  • In areas with weak or no connection at all

Under the hood

The Berty protocol comes with a universal but fully functional SDK that allows developers to write peer-to-peer applications. You can focus only on the advanced features of your application, and we will handle the rest (encryption, identity, network routing, group management, account management, device management, application lifecycle).

The main concept of the Berty protocol is called “group”, a virtual place where multiple devices can share messages and metadata using OrbitDB, which itself relies on the InterPlanetary File System (IPFS)

Get it:

git clone https://github.com/berty/berty

Anti censorship and anti surveillance communication protocol

Berty is an anonymous, secure point-to-point protocol that can run without an Internet connection.

There is a protocol that uses advanced cryptography and a messenger application built on top of it.

  • Creating an account does not require a phone number or email
  • End to end encryption used to encrypt all conversations
  • Focus on leaking as little metadata as possible
  • Decentralized, distributed, and serverless
  • No consensus, no blockchain
  • No internet connection (using BLE technology and mDNS)
  • Forever free, no data storage, transparent code, open source

Purpose:

  • When you need to share sensitive information.
  • If you want to communicate with good anonymity.
  • If you don’t want to use the server because you want complete control over your data.
  • In countries with censorship and restrictions on internet access and use.
  • In areas where the connection or cellular reception signal is weak or non-existent.
  • When you travel and wish to communicate securely through insecure public connections.

Go-IPFS-Log

IPFS log was originally created for distributed peer-to-peer databases on orbit db IPFS. This library aims to provide fully compatible ports for JavaScript versions in Go.

Most of this code comes from the IPFS log library in JavaScript.

Gomobile-IPFS

This repo aims to provide packages for Android, iOS, and React Native, allowing people to run and use IPFS nodes on mobile devices. It is also a place to discuss the limitations of running IPFS on mobile devices in order to find solutions and communicate skills.

road map

  • Basic Java/Swift<->go ipfs binding
  • InputStream as request body and request response IN PROCESS
  • Unit testing using Android/iOS testing framework
  • SetStreamHandler(protocolID, handler) and NewStream(peerID, protocolID) binding
  • Packages built and published using CI
  • Android/iOS lifecycle management
  • React -Native Module in progress
  • Improve this self description file

Berty Agreement

This document provides a technical description of the Berty protocol. The Berty protocol provides secure communication between devices owned by the same account, communication between contacts in one-on-one conversations, and communication between multiple users in multi member groups. This article will explain how these points are implemented in a distributed and asynchronous manner, regardless of whether IPFS and direct transport (such as BLE) are used to access the Internet. It will also describe how the Berty protocol provides end-to-end encryption and perfect forward secrecy for all exchanged messages.

influence

Berty uses IPFS for specific purposes of instant messaging. There are two main advantages of using peer-to-peer networks for instant messaging:

  • It is almost impossible to stop or cancel it: anyone can start a node on their computer within a few seconds, and two nodes in the same LAN can still communicate and operate without Internet access. In the centralized model, it is easier to block access to related company servers, or even force them to shut down their servers and stop their activities.
  • Difficult to monitor: There is no central server that can be monitored, nor is there a central directory that can be destroyed, so metadata collection is greatly reduced. The Berty protocol is not a directory that links public keys with personal data such as phone numbers, but uses a combination of TOTP and public keys to generate a collection point address and register its users on IPFS, which can then be contacted with peers who wish to communicate.

However, it also brings some technical limitations:

  • Content availability: Due to the lack of central storage, all messages are stored on user devices and cannot be accessed from devices that are offline or inaccessible from a given network.
  • Asynchronous: There is no central server to govern the timeline, so timestamps cannot be used for any purpose other than critical tasks (such as displaying messages in a specific order). For example, expiration time cannot be used to revoke access to resources, and the order in which operations occur in a set of peers cannot be determined with certainty……
  • Permission: There is no central authority to arbitrate operations and any resulting conflicts or manage user identities and permissions.

Marshal Point

A collection point is a volatile address on a peer-to-peer network where two devices can meet. Peers can register their peer IDs and/or obtain a list of registered peers on a given set of points. In this way, for example, peers who need to connect together to exchange messages in a conversation can find each other.

Peers need to be able to generate the same address for a given set point using previously shared secrets.

In the Berty protocol, the address of a collection point is generated by two values:

  • Resource ID
  • Time based token generated from a 32 byte seed

The generation of time-based tokens follows the core principles of RFC 6238.

// golang
func rendezvousPoint(id, seed []byte, date time.Time) []byte {
    buf := make([]byte, 32)
    mac := hmac.New(sha256.New, seed)
    binary.BigEndian.PutUint64(buf, uint64(date.Unix()))

    mac.Write(buf)
    sum := mac.Sum(nil)

    rendezvousPoint := sha256.Sum256(append(id, sum...))

    return rendezvousPoint[:]
}

There are two types of collection points in the Berty protocol:

  • Public Collection Point: Accounts use this collection point to receive contact requests. The resource ID used here is the Account ID, and the seed can be updated by the user at will, so the ability to send contact requests to users with only the previous seed can be revoked.
  • Group collection point: This collection point is used to exchange messages within a group. The resource ID used here is the Group ID, and the seed cannot be changed.

—END—

Open source protocol:Apache-2.0, MIT

资源下载此资源为免费资源立即下载
Telegram:@John_Software

Disclaimer: This article is published by a third party and represents the views of the author only and has nothing to do with this website. This site does not make any guarantee or commitment to the authenticity, completeness and timeliness of this article and all or part of its content, please readers for reference only, and please verify the relevant content. The publication or republication of articles by this website for the purpose of conveying more information does not mean that it endorses its views or confirms its description, nor does it mean that this website is responsible for its authenticity.

Ictcoder Free Source Code Berty is an open, secure, peer-to-peer, and zero trust messaging application https://ictcoder.com/berty-is-an-open-secure-peer-to-peer-and-zero-trust-messaging-application/

Qizhuwang Source Code Trading Platform

Q&A
  • 1. Automatic: After making an online payment, click the (Download) link to download the source code; 2. Manual: Contact the seller or the official to check if the template is consistent. Then, place an order and make payment online. The seller ships the goods, and both parties inspect and confirm that there are no issues. ICTcoder will then settle the payment for the seller. Note: Please ensure to place your order and make payment through ICTcoder. If you do not place your order and make payment through ICTcoder, and the seller sends fake source code or encounters any issues, ICTcoder will not assist in resolving them, nor can we guarantee your funds!
View details
  • 1. Default transaction cycle for source code: The seller manually ships the goods within 1-3 days. The amount paid by the user will be held in escrow by ICTcoder until 7 days after the transaction is completed and both parties confirm that there are no issues. ICTcoder will then settle with the seller. In case of any disputes, ICTcoder will have staff to assist in handling until the dispute is resolved or a refund is made! If the buyer places an order and makes payment not through ICTcoder, any issues and disputes have nothing to do with ICTcoder, and ICTcoder will not be responsible for any liabilities!
View details
  • 1. ICTcoder will permanently archive the transaction process between both parties and snapshots of the traded goods to ensure the authenticity, validity, and security of the transaction! 2. ICTcoder cannot guarantee services such as "permanent package updates" and "permanent technical support" after the merchant's commitment. Buyers are advised to identify these services on their own. If necessary, they can contact ICTcoder for assistance; 3. When both website demonstration and image demonstration exist in the source code, and the text descriptions of the website and images are inconsistent, the text description of the image shall prevail as the basis for dispute resolution (excluding special statements or agreements); 4. If there is no statement such as "no legal basis for refund" or similar content, any indication on the product that "once sold, no refunds will be supported" or other similar declarations shall be deemed invalid; 5. Before the buyer places an order and makes payment, the transaction details agreed upon by both parties via WhatsApp or email can also serve as the basis for dispute resolution (in case of any inconsistency between the agreement and the description of the conflict, the agreement shall prevail); 6. Since chat records and email records can serve as the basis for dispute resolution, both parties should only communicate with each other through the contact information left on the system when contacting each other, in order to prevent the other party from denying their own commitments. 7. Although the probability of disputes is low, it is essential to retain important information such as chat records, text messages, and email records, in case a dispute arises, so that ICTcoder can intervene quickly.
View details
  • 1. As a third-party intermediary platform, ICTcoder solely protects transaction security and the rights and interests of both buyers and sellers based on the transaction contract (product description, agreed content before the transaction); 2. For online trading projects not on the ICTcoder platform, any consequences are unrelated to this platform; regardless of the reason why the seller requests an offline transaction, please contact the administrator to report.
View details

Related Source code

ICTcoder Customer Service

24-hour online professional services