P2P Messenger Donations Accepted
by DrunkHacker - Friday February 14, 2025 at 11:16 PM
#1
Hello, Everyone This is DrunkHacker AKA c0mrade I have decided to offer my time free of charge to the betterment of our community I will first start out with BF members only and I have decided to make this open source because I have no need to profit from it but to offer true anonymousness to all of our users and more. If you would like to donate to the Alcohol fund you can send Crypto to any of these addresses.

ETH 0xfDD806a685EE3A31cE92253B6911C499b3a5eb6e

Solana GZevcRWhV2eH15yrwzcENi9LwuKJb56QPE8cr14JATFF

BTC bc1qnvruh3cecxypvhq30zqtz9209gtpnkdrsmcqmk

Monero
0x49730E9c82356D378C594fcb37739241b68A5dbC

I dont work for anyone so no I wont build you a fucking spaceship anyways here is some of the details.
Fully Decentralized P2P Network
No central servers No single point of failure/attack
Uses Kademlia DHT for peer discovery (like BitTorrent)
Messages routed through random nodes before delivery
Tor/I2P integration by default for all traffic
Memory-safe languages only Rust&WASM core
Air-gapped key generation during setup
All network traffic wrapped in QUIC UDP-based, encrypted-by-default

the Encryption basis will work like this.
Encryption: The Cryptographic Fortress
Layer Technology Purpose
Payload Signal Protocol + XChaCha20-Poly1305 Core message encryption
Metadata Nested encryption (ECIES → Kyber → McEliece) Protect sender/receiver info
Routing Onion Routing (5+ layers) + Dandelion++ Obfuscate message path
Identity Stealth Addresses (per message) + Zerocoin Protocol Break transaction linkability

As most of you know I work with quantum computing so i wanted to add something special to make our program last longer.
Quantum-Resistant Hybrid
Combine NTRU (post-quantum) with X25519 (classical ECC)
Key cycling: Rotate keys every 24h automatically

I will also be utilizing something I like to call The Ghost Protocol
Triple-Anonymity Set
Ring Signatures (64+ participants per message)
Differential Privacy noise in timestamps
Cover Traffic (30% fake messages network-wide)
Plausible Deniability
Deniable Authentication: Messages can't prove authorship
Shamir Secret Sharing: Split messages across nodes
Advanced IP Obfuscation
Marionette Protocol: Fake TCP handshakes
Decoy Routing: Randomly bounce through AWS/GCP IPs

and the rest you will have to see Enjoy my friends and lets all stay safe.
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Banned on another forum | https://patched.to/Thread-scam-report-ag...hacker-150
Reply
#2
Who responded and what did deplorerDer say looks like it got deleted?
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Banned on another forum | https://patched.to/Thread-scam-report-ag...hacker-150
Reply
#3
some libraries for anyone interested
libp2p
quinn
x25519-dalek
kyber
libsodium
signal-protocol-rust
tor-rust
i2pd
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Death threats to staff | "i swear if i see you in prison i'll send someone to slit your throat"
Reply
#4
(02-14-2025, 11:16 PM)DrunkHacker Wrote: Hello, Everyone This is DrunkHacker AKA c0mrade I have decided to offer my time free of charge to the betterment of our community I will first start out with BF members only and I have decided to make this open source because I have no need to profit from it but to offer true anonymousness to all of our users and more. If you would like to donate to the Alcohol fund you can send Crypto to any of these addresses.

ETH 0xfDD806a685EE3A31cE92253B6911C499b3a5eb6e

Solana GZevcRWhV2eH15yrwzcENi9LwuKJb56QPE8cr14JATFF

BTC bc1qnvruh3cecxypvhq30zqtz9209gtpnkdrsmcqmk

Monero
0x49730E9c82356D378C594fcb37739241b68A5dbC

I dont work for anyone so no I wont build you a fucking spaceship anyways here is some of the details.
Fully Decentralized P2P Network
No central servers No single point of failure/attack
Uses Kademlia DHT for peer discovery (like BitTorrent)
Messages routed through random nodes before delivery
Tor/I2P integration by default for all traffic
Memory-safe languages only Rust&WASM core
Air-gapped key generation during setup
All network traffic wrapped in QUIC UDP-based, encrypted-by-default

the Encryption basis will work like this.
Encryption: The Cryptographic Fortress
Layer Technology Purpose
Payload Signal Protocol + XChaCha20-Poly1305 Core message encryption
Metadata Nested encryption (ECIES → Kyber → McEliece) Protect sender/receiver info
Routing Onion Routing (5+ layers) + Dandelion++ Obfuscate message path
Identity Stealth Addresses (per message) + Zerocoin Protocol Break transaction linkability

As most of you know I work with quantum computing so i wanted to add something special to make our program last longer.
Quantum-Resistant Hybrid
Combine NTRU (post-quantum) with X25519 (classical ECC)
Key cycling: Rotate keys every 24h automatically

I will also be utilizing something I like to call The Ghost Protocol
Triple-Anonymity Set
Ring Signatures (64+ participants per message)
Differential Privacy noise in timestamps
Cover Traffic (30% fake messages network-wide)
Plausible Deniability
Deniable Authentication: Messages can't prove authorship
Shamir Secret Sharing: Split messages across nodes
Advanced IP Obfuscation
Marionette Protocol: Fake TCP handshakes
Decoy Routing: Randomly bounce through AWS/GCP IPs

and the rest you will have to see Enjoy my friends and lets all stay safe.

Would like to donate some other crypto, what is the best way to reach you? Send me your session please
Reply


Forum Jump:


 Users browsing this thread: