WASTE

Waste - Anonymous, secure, and encryped sharing between distant parties on the internet, independent of their local network
Download

WASTE Ranking & Summary

Advertisement

  • Rating:
  • License:
  • GPL
  • Price:
  • FREE
  • Publisher Name:
  • The Waste Team
  • Publisher web site:
  • Operating Systems:
  • Mac OS x
  • File Size:
  • 637 KB

WASTE Tags


WASTE Description

Waste - Anonymous, secure, and encryped sharing between distant parties on the internet, independent of their local network Waste is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independent of local network organization.Waste is an anonymous, secure, and encryped collaboration tool which allows users to both share ideas through the chat interface and share data through the download system. Waste is RSA secured, and has been hearalded as the most secure P2P connection protocol currently in development. Waste creates a network of hosts, making whatever connections possible, and typically routes traffic via the path of lowest latency (which effectively ends up as load-balancing, though it is far from ideal).With at least one host outside of firewalls (or behind a firewall but having one incoming port open), a Waste network can enable all supported services (including chat and file transfer) between any two hosts. Here are some key features of "Waste":· WASTE is currently available for Mac OS X as a limited client and server, 32-bit Windows operating systems as a client and server, and as a limited functionality server for Mac OS X, Linux, FreeBSD, and Windows. Porting to other operating systems should· WASTE currently provides the following services: Instant Messaging (with presence), Group Chat, File browsing/searching, File transfer (upload and download)· Network architecture: WASTE uses a distributed architecture that allows for nodes to connect in a partial mesh type network. Nodes on the network can broadcast and route traffic. Nodes that are not publicly accessible or on slow links can choose not to route traffic. This network is built such that all services utilize the network, so firewall issues become moot. more information.· Security: WASTE uses link-level encryption to secure links, and public keys for authentication. RSA is used for session key exchange and authentication, and the links are encrypted using Blowfish in PCBC mode. The automatic key distribution security model is very primitive at the moment, and may not lend itself well to some social situations. more information.


WASTE Related Software