Sign In  |  Register  |  About Walnut Creek Guide  |  Contact Us

Walnut Creek, CA
September 01, 2020 1:43pm
7-Day Forecast | Traffic
  • Search Hotels in Walnut Creek Guide

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

Social APP-BSS tailored for WEB3 users, is it a gimmick or the future?

It is a well-known fact that our personal information data is being leaked all over the world through various mobile applications and software. Recently, the United States has been criticized for long-term indiscriminate voice monitoring of Chinese mobile phone users, illegally stealing mobile phone users’ text messages, and wirelessly locating them. To this day, I believe that no one will be surprised by this news. As users, what we don’t know is only which countries our data is sold to, which companies, and for what purposes.

We seem to be streaking around in the internet world, with no privacy at all, especially chat software, where eavesdroppers of all kinds—whether state agencies, malicious attackers, or just nosy people—can see our chat history.

Due to the natural nature of decentralization, web3 users seem to generally pay more attention to the protection of personal privacy than traditional Internet users. From Telegram to Signal, encryption software has been changed one after another, but none of the social applications really impressed to the hearts of users in the decentralized world.

However, a young Singaporean geek team is working on a chat app called Blockchain Social Software to try to change that. They chose this extremely narrow track, ready to break through all traditional shackles, claiming to “redefine decentralized social applications”. For them, the most basic focus is naturally to use “end-to-end encryption technology” to solve security.

How does BSS end-to-end encryption work?

On a technical level, each public key only matches one private key (= public key cryptography). These keys are used to encrypt and decrypt information. If you encode information with a person’s public key, they can only decode the information with their matching private key.

When the data is encrypted, it is changed into an unreadable format. From then on, any third party in possession of the data will not be able to decrypt the encrypted data, let alone read the information sent. Only the intended recipient can decrypt the data and turn it into a readable format.

This is called asymmetric encryption. Typically, asymmetric encryption systems use AES and RSA algorithms, and BSS is no exception. Of course, this asymmetric encryption will likely become breakable once quantum computers are developed. Therefore, how to implement post-quantum security algorithms is also a topic that the entire industry is working hard to overcome.

What data can be encrypted end-to-end?

Originally, end-to-end encryption was all about communications, most notably email encrypted via PGP. One reason is that PGP was the first system to let people communicate via email with end-to-end encryption.

However, due to the complexity of PGP, despite its popularity, it never entered the mainstream market. Today, many providers from email services to chat apps offer automatic end-to-end encryption, which makes switching to encrypted communications easier for everyone.

Building on this, there are now also end-to-end encrypted applications (like BSS) that offer features like encrypted calendars, although here it is always the same person who uploads and downloads data (rather than two people as in email or chat communications) ), but the data is still encrypted end-to-end. It is encrypted on the user’s device, then uploaded in encrypted form to the provider’s servers, where it is downloaded and decrypted again on the user’s device.

So, only if end-to-end encryption is applied, the provider cannot decrypt any of the user’s data. That’s what BSS does. They will encrypt all user data end-to-end so that they cannot access encrypted data stored by users. Since they have no access to the user’s private key, only the user can decrypt their own data. This can be said to provide users with 100% data security.

Hit the new craze, the Berry exchange will be launched soon to start subscription

Berry Exchange has the world’s leading digital financial asset risk control management and operation team, adhering to the mission of making investment safer, more reliable and more valuable, providing users with safe and reliable digital asset trading and asset management services. Berry is the ultimate guardian of transaction security. Subscription time: 15:00 on September 22nd to 22:00 on September 22nd, South Africa time.

Of course, the goal of BSS is not only to create an application that only provides end-to-end encrypted chat services. In order to help Web3 users solve more daily pain points and create an epoch-making social application that integrates more practical functions, the BSS team has planned More functions such as “information burns after reading”, “one-click connection to mainstream wallets” and “social discussion market on the square”.

BSS acts as a social networking platform to connect people with common interests. Find opportunities, share investment ideas, and win deals together.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Copyright © 2010-2020 WalnutCreekGuide.com & California Media Partners, LLC. All rights reserved.