Author

Topic: [ANN] Anonymous email client VEDA for confidential communication ✅ ✅ ✅ (Read 641 times)

newbie
Activity: 54
Merit: 0
How VEDA tokens are encrypted

Tokens are encrypted twice using GOST R 34 series algorithms. The algorithms form a unique sequence of numbers on the basis of which key pairs are generated. Therefore, in the group of all possible solutions the keys are always unique.

Lets compare the durability of the algorithm GOST R 34 with SHA-256, which is used in Bitcoin.

SHA-256 can be hacked with the help of modern technologies: in 2008 Somitra Kumar Sanadia and
Palash Sarkar published the collisions they found for 22 iterations. After that programmers found ways to crack 31 more iteration of SHA-256.

The GOST R 34 series cipher is not a Feistel network, but an SP-network: data transformation consists of several identical rounds. Each round consists of a nonlinear and linear transformation, as well as a key overlay operation. Unlike the Feistel network, when using an SP network, the entire input block is converted, not its half.

Peculiarities of the algorithm:

🔹Linear transformation can be implemented using a shift register;
🔹Key scan is implemented using a Feistel network, which uses the round transformation of the original algorithm as a function;
🔹Input block length-128 bits, key length-256 bits. Private keys are stored in the encrypted area.
newbie
Activity: 54
Merit: 0
Anonymization in Tor: How does the browser work?

Many of us, for one reason or another, wish to remain unnoticed while using Internet. In this article, we won’t talk over the reasons, but instead, offer you several options to ensure a higher level of privacy when using the Tor browser.

https://medium.com/@Ir_43281/anonymization-in-tor-71414a15ffe3
newbie
Activity: 54
Merit: 0
A large-scale update of the VEDA mail client has been completed today.
We inform you about the possibility to download and install a modified version of the client for Windows, Mac and Linux.
Now all users have the opportunity to send files of any type up to 50 MB!

Team VEDA.
newbie
Activity: 54
Merit: 0
Why privacy and personal data protection are so important

Due to the widespread use of information gathering devices, we can no longer be 100% sure that our lives remain confidential. The services on which we register often collect data without our knowledge. Periodically there are news about the mass plums of correspondences of Facebook users. All this should warn, because, in fact, whoever wants, can get access to your data.

Read more about this in our new online privacy article.
https://medium.com/@Ir_43281/why-privacy-and-personal-data-protection-are-so-important-9b391c68f336?postPublishedType=initial
newbie
Activity: 6
Merit: 0
I downloaded and installed the application under MacOS. The registration procedure is quite simple - I understand the email that I specify when registering and will be my address in the system in the future? And if I register another email client for the same email - how will my interlocutors send me messages? I want to praise your minimalistic interface. I will advise your application to your friends. I hope it will not wither and you will develop it. The question is when will it be possible to send files?
newbie
Activity: 54
Merit: 0
It's ok for me to use Proton. Why do we need such decentralized mail?
Our mail client has two major differences. We do not use the server to store or process information. The VEDA team does not have access to the correspondence and personal data of users.
newbie
Activity: 54
Merit: 0
Explain me please how does your mail work?

VEDA’s technology is a combination of distributed registry, encrypted communication channels, token files and smart contracts.
VEDA’s technology is based on networks of VEDA – numerous VEDA clients running on nodes that compose VEDA’s blockchain. VEDA's customers are custom applications, and nodes, intended for generation and storage of distributed registry.

VEDA uses elliptic curve cryptography to ensure the confidentiality, authenticity, and reliability of all transactions. Each external account (Wallet account and Node account) is a pair of keys – private and public, and is associated with a changeable network state that is updated when transactions are confirmed by the network.

Step 1
Run the VEDA Mail Client application, get authorized in the network. Then create a document or type a message to be sent. Specify the address of the recipient's account. For each pair of subscribers the symmetric key with use of the Diffie-Hellman Protocol is developed.   It is used to encrypt messages or to generate an electronic signature.

Step 2
The mail client encrypts the message’s body and adds it to the VEDA Token with a unique structure – a digital entity that is stored directly in the user's device. And in VEDA – it is a file that is stored in the crypto-container of its own implementation. In addition to tokens in crypto-containers, an SSL certificate and a private key of the account are stored on the user's device.  Each token has its own unique identifier – VEDAID – VID.

Step 3
The PrivateMailVeda email client generates a transaction for the token transfer. A transaction is an electronically signed data structure that is transmitted over the VEDA network and placed in a DAG. Each new transaction contains the TID of the preceding transaction or transactions.
The token and the transaction are sent to random hosts (token and transaction are sent to different hosts in random order). Nodes can be custom power for the case of a public network or computing facilities of VEDA’s developers. • Copy of the chain is stored on G-Node and on all other nodes in VEDA network.
• When connected to the network, the user sends a certificate to the node along with the asymmetric encryption session key to verify identity and establish an encrypted channel.
• When receiving a certificate, the node first checks the signature and then searches for the SID (sertificate ID) in the SSL-certificate blockchain.
• If there was a request to register a new wallet, then in the case of a reliable signature and the absence of data about the certificate with such SID in blockchain, the sent certificate is placed in the certificate pool of the nearest G-Node.
• If there was a request for authorization of an existing wallet, then in the case of a reliable signature and the presence of data on the certificate with such SID in blockchain, the user receives a positive response and a secure communication channel is established. Otherwise, the user gets a negative response and looses connection.
Step 4
After the tokens are received by the host, they are stored in a special encrypted area – the crypto container.
Recieved transaction is placed in the pool for confirmation.
Step 5
After confirmation of the transaction by the network nodes, in the course of consensus, the account-recipient has the opportunity to pick up sent with a message, from the host on which it is stored. The accuracy of the transaction in the DAG is provided by the presence of transaction sender’s signature in it and a signature of the node that accepted the transaction. Each new transaction in a DAG holds the hash-sums of all its parents, which, in turn, contain the hash-sums of all its parents and so on.   

Step 6
The account-recipient sends the request to the network and receives the token addressed to him.

newbie
Activity: 54
Merit: 0
I understand there is a client for MacOS and Windows, and when will the client for Linux appear?

Client for Linux will be on GitHub next week
newbie
Activity: 2
Merit: 0
Explain me please how does your mail work?
newbie
Activity: 6
Merit: 0
I understand there is a client for MacOS and Windows, and when will the client for Linux appear?
newbie
Activity: 1
Merit: 0
How do you guarantee privacy?
newbie
Activity: 4
Merit: 0
It's ok for me to use Proton. Why do we need such decentralized mail?
newbie
Activity: 2
Merit: 0
Sounds good. But why aren't you another scam? Smiley
newbie
Activity: 54
Merit: 0
What is the structure of the VEDA token?
Our token is not a means of payment. We use an encrypted file, the current technology for data transmission.

 Algo  Huh
We use an encrypted token file to transfer any information, including files. Through the use of this technology, you can not be afraid of hitting the message to third parties. You can learn more about data transmission technology on our website https://privatnet.io/
newbie
Activity: 61
Merit: 0
What is the structure of the VEDA token?
Our token is not a means of payment. We use an encrypted file, the current technology for data transmission.

 Algo  Huh
newbie
Activity: 54
Merit: 0
What is the structure of the VEDA token?
Token Veda - means of payment, for them you can buy service tokens and they can be transferred to other users. We use an encrypted file, the current technology for data transmission.
newbie
Activity: 54
Merit: 0
What do you mean "privacy"?

Private communication is the ability to exchange emails or messages with other users without fear of disclosing your personal data and correspondence.
newbie
Activity: 6
Merit: 0
The idea is certainly interesting, but how do you think who is the target audience of your application?
newbie
Activity: 3
Merit: 0
What is the structure of the VEDA token?
newbie
Activity: 4
Merit: 0
What do you mean "privacy"?
newbie
Activity: 54
Merit: 0
Protection of information is one of the main priorities for business, but ordinary users rarely think about how and for what purposes attackers can get their personal information, passwords, etc.

In this article, we have collected the most simple, useful tips to help you protect passwords, financial information and personal data from third-party access.

https://medium.com/@Ir_43281/tips-for-protecting-your-personal-data-on-local-media-and-in-the-internet-7061eadfcc77?postPublishedType=repub
newbie
Activity: 54
Merit: 0
Who is the target audience of our technology and why did we create a VEDA email client?

You can learn more about this from this article.

https://medium.com/@Ir_43281/target-audience-for-the-product-a00932fe7376
newbie
Activity: 54
Merit: 0
I don't think this may be interesting to most users. There are already a lot of anonymous messengers, they have a large audience, and they are unlikely to want to change them to veda email.
Do you plan to develop a mobile version?
Yes, there really are many convenient ways to communicate online. But our project focuses on privacy and anonymity. The key difference between the VEDA email client and all other email clients and instant messengers in data transmission technology. You can learn more about the technology on our website privatnet.io.
Perhaps not everyone will be comfortable using the email client, so in the future we also plan to create an instant messenger based on VEDA technology.
Within a month we will launch open testing of the mobile version of mail.
newbie
Activity: 54
Merit: 0
In this article we will discuss the reasons for the establishment of our technology and the preconditions that made us understand the importance of products made on the basis of technology VEDA.

https://medium.com/@Ir_43281/preconditions-for-the-creation-5886bd19ab54
newbie
Activity: 54
Merit: 0
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/

would assume you're one of the dev team of this project? Do you mind informing us the reason behind the self proclaimed negativity on your project like "boring" or "we have nothing"? At first I thought it was the thread designer's glitch, but I realized it is also on your website.
There is no negative in this slogan) We want to emphasize that in the VEDA system you can easily exchange information and not be afraid that someone will hack into your data.
In many messengers and social networks there are often leaks and hacks. We wanted to say with this slogan that our users do not have to face such problems.
Legit, I'm confused and curious if there's another meaning to "boring" in tech language. To be sure, you do mean to say that your project invite people to "be boring"? As in dull? Monotonous? Flat? And "have nothing" is synonymous to "lacking of ... "? Which, both are self depreciating, thus negative.
Initially, our slogan was written in Russian. Perhaps in English it sounds a bit incorrect. We will try to fix it soon.
legendary
Activity: 2632
Merit: 1462
Yes, I'm an asshole
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/

would assume you're one of the dev team of this project? Do you mind informing us the reason behind the self proclaimed negativity on your project like "boring" or "we have nothing"? At first I thought it was the thread designer's glitch, but I realized it is also on your website.
There is no negative in this slogan) We want to emphasize that in the VEDA system you can easily exchange information and not be afraid that someone will hack into your data.
In many messengers and social networks there are often leaks and hacks. We wanted to say with this slogan that our users do not have to face such problems.

Legit, I'm confused and curious if there's another meaning to "boring" in tech language. To be sure, you do mean to say that your project invite people to "be boring"? As in dull? Monotonous? Flat? And "have nothing" is synonymous to "lacking of ... "? Which, both are self depreciating, thus negative.
newbie
Activity: 54
Merit: 0
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/
Great idea! I think the demand for your product will be cosmic. No one wants any service to read your messages
Thank you for your feedback! We are glad to hear it)
newbie
Activity: 54
Merit: 0
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/

would assume you're one of the dev team of this project? Do you mind informing us the reason behind the self proclaimed negativity on your project like "boring" or "we have nothing"? At first I thought it was the thread designer's glitch, but I realized it is also on your website.
There is no negative in this slogan) We want to emphasize that in the VEDA system you can easily exchange information and not be afraid that someone will hack into your data.
In many messengers and social networks there are often leaks and hacks. We wanted to say with this slogan that our users do not have to face such problems.
full member
Activity: 420
Merit: 108
The mail client has to support some standard, in order to be able to communicate with others, otherwise it can only compete with some secure messengers. It might be also not bad, but still far less used than a mail client
legendary
Activity: 2632
Merit: 1462
Yes, I'm an asshole
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/

would assume you're one of the dev team of this project? Do you mind informing us the reason behind the self proclaimed negativity on your project like "boring" or "we have nothing"? At first I thought it was the thread designer's glitch, but I realized it is also on your website.
full member
Activity: 574
Merit: 100
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/
Great idea! I think the demand for your product will be cosmic. No one wants any service to read your messages
newbie
Activity: 54
Merit: 0
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
Thank you for your interest in our project! We have a key difference from whats app, the email client VEDA uses a unique data transfer technology. Information and any data is transmitted using an encrypted file. Only sender and recipient have access to this information. You can learn more about our technology on the website https://privatnet.io/
member
Activity: 322
Merit: 20
Decentralized Gaming Platform - Play & Earn $
This client is somewhat similar to Whatsapp, if it is so convenient I will be happy to go to your program
member
Activity: 476
Merit: 19
Professional Designer & Manager | PM ME
I am not a member of this project team.

Anonymous email client VEDA for confidential communication








Jump to: