0.1.6 • Published 5 months ago

hush-messenger v0.1.6

Weekly downloads
-
License
GPL-3.0
Repository
-
Last release
5 months ago

Hush Messenger

The Amnesic Incognito Oblivious Chat experimental

What is Hush?

Hush is a portable communication tool and in-memory designed to safeguard users from surveillance and censorship. It allows for anonymous and decentralized messaging, ensuring that your conversations remain private and secure. Hush achieves this by leveraging the power of a Distributed Hash Table (DHT) network, a decentralized and resilient system that avoids reliance on central servers. This makes it extremely difficult for anyone to intercept, monitor, or censor your messages.

Who is Hush for?

Hush is built for anyone who values privacy and security in their communications, but it is particularly useful for:

  • Activists: Hush enables activists to communicate securely without fear of government monitoring or interference.
  • Journalists: Journalists can use Hush to protect their sources and sensitive information. They can securely communicate with whistleblowers and share confidential documents without fear of leaks or exposure.
  • Anyone who needs secure and private communication: Whether you are concerned about government surveillance, corporate data collection, or simply want to maintain your privacy, Hush provides a secure and reliable platform for all your communication needs.

How does Hush work?

Hush leverages a Distributed Hash Table (DHT) network to facilitate messaging. Here's a breakdown:

  • Decentralized Network: Unlike traditional messaging systems that rely on central servers, Hush operates on a decentralized network of nodes.
  • Distributed Hash Table (DHT): The DHT acts as a distributed index, allowing each node to store a small portion of the data. This means there is no single point of failure or control, making it much more resilient and censorship-resistant.
  • Anonymous Messaging: Messages are routed through the DHT, ensuring that the sender and recipient's identities are hidden. This provides a high level of anonymity.
  • End-to-End Encryption: (Future Feature) While currently in experimental phase, Hush aims to provide end-to-end encryption to ensure only the sender and intended recipient can read the message content.

By utilizing the DHT, Hush ensures that messages are:

  • Anonymous: The sender and receiver remain anonymous.
  • Decentralized: No single point of failure.
  • Censorship-resistant: Messages are difficult to block or intercept.

How to Use Hush

Hush is designed to be straightforward to use, even if you're not a programmer. Here's a step-by-step guide:

  1. Connecting to the Network:
    • Command: /connect
    • Description: This command connects you to the Hush network, making you visible to other users. Think of it as joining a group chat room.
    • Example: Type /connect and press Enter. You'll see a message confirming that you've joined the network.
  2. Send Messages:

    • Description: once you're connected you only need to write the message and press enter, all peers receive the message.
    • Example: write "hello how are you?" press Enter, and all users who are connected will receive it.
  3. Saving your Session:

    • Command: /save
    • Description: This command saves your current connection state. This allows you to reconnect quickly next time.
    • Example: Type /save and press Enter. This will store the necessary information for you to join the same network later.
  4. Viewing Connected Users:

    • Command: /peers
    • Description: This command displays a list of all users currently connected to the Hush network. It's like seeing who else is in the chat room.
    • Example: Type /peers and press Enter. You'll see a list of user IDs.
  5. Exiting Hush:

    • Command: /exit
    • Description: This command cleanly disconnects you from the network and closes Hush. It's like leaving the chat room.
    • Example: Type /exit and press Enter. Hush will close.

Software Libre

Hush is open-source software. This means that the code is publicly available for anyone to review, modify, and improve. This transparency ensures that the software is trustworthy and secure.

0.1.6

5 months ago

0.1.5

5 months ago

0.1.4

5 months ago

0.1.3

5 months ago

0.1.2

5 months ago

0.1.1

5 months ago

0.1.0

5 months ago