Bitchat is a new tool for chatting and communicating. That application offers end-to-end encryption. P2P communication.The new application for P2P messaging and maybe, quite soon, for other data sharing uses BlueTooth for communication. The BlueTooth has its limits for communication. The range for that communication tool is the main problem, and the system requires mesh technology. That means support stations for long-range communication. The other version is to use an extra power BlueTooth device or some kind of amplifier that can increase the range of the BlueTooth. The system can use a standard radio amplifier that raises the BlueTooth power.
***************************************************
Standard BlueTooth devices have the following classes and ranges.
Device Power Class Bluetooth Range
Class-1 100 meters
Class-2 10 meters
Class-3 1 meter
(https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage)
***************************************************
Or a series of mobile telephones with BlueTooth capacity. BlueTooth is a common system in wireless headphones, mice, and other kinds of wireless tools. BlueTooth allows to share an internet connection and share files between devices outside the Internet. That thing makes it possible that the data can be shared outside the network. That can cause some data security problems. The BlueTooth connection requires that the other participant of the session send the access key to the other participant. And there is a possibility to cheat a person into connecting the device to the wrong system. That means the system’s ID is easy to fake. Or there can be a router in a mesh station that sends all data to the network.
And if the hacker sends the fake ID to another participant using the stolen ID, that means those people can connect their devices to the hacker's computer. The problem is that the ID that the device uses can be stolen or even created by hackers. But the end-to-end encryption protects privacy against internet-based eavesdropping. This kind of system can be interesting. They can replace internet-based data transportation. But there are also weaknesses. And one of them is this.
Because there are no phone numbers, no internet, and no servers. That means those systems are hard to hack over the net. But there is a possibility of cheating the users into sending data to hackers’ devices. Or there can be a router in a mesh station that can double the data flow. And that can endanger data security. Because BlueTooth range is so short, the need to use mesh stations can endanger data security.
https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage
https://www.rudebaguette.com/en/2025/07/jack-dorseys-offline-messaging-bombshell-bitchat-launches-peer-to-peer-app-with-end-to-end-encryption-and-zero-tracking-for-total-privacy/
Bitchat homepage:
https://bitchat.free/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.