Chapter 222: Bit Messenger

readx;

The new version of CQCQ is progressing very quickly, after all, Lin Hong has had similar programming experience before, and many of the code can be reused, but due to the large changes in the architecture, there are still some important codes that need to be reimagined. Pen | fun | pavilion www. biquge。 info Sanctuary

According to the design of this time, the relay server does not store any private content of possible users, including the user's account, password, and personal information, the chat content sent, the IP address, and the destination of the message...... Wait a minute.

The relay server is named "directory server" by Lin Hong, which only stores the network topology node of the client that is currently online, and every user who uses this software can act as the server side, and may be selected as the jump relay node.

When a private channel for user data exchange is actually created, the current relay node only knows two pieces of information, which node the current packet is coming from, and which node to send to. As for the superior of the upper level and the subordinate relay nodes of the lower level, it is completely unknown.

No single relay node will know the full path of the packet, because the client assigns an encryption key to each hop to ensure that the connection data is not tracked as it passes.

This key is temporarily generated, even if the user has been in contact with the same person, this path is not fixed, according to Lin Hong's design, the key will be changed every ten minutes, that is, a completely different connection channel will be established.

Lin Hong took into account all the links that he could think of that might be monitored, and there was only one purpose for doing so, for safety, in order to avoid being monitored by a third party.

Since you don't want to use a central server to store data and information, all data will be stored in a decentralized client.

The safest way is to download all registered user information to local storage in each client, so that no matter which one disappears, you don't have to worry about losing your information, because the most secure encryption algorithm is used, and you don't have to worry about anyone brute-forcing these accounts, even if you crack it, it's useless, it's nothing more than getting this account, and the chat history will not be uploaded and saved. Templar

However, if you use this method, you may be able to do it at the beginning, after all, it is just the account and password, and it does not take much space, and when the number of people increases to a certain order of magnitude, there will be a problem of too large data.

Every newly registered user may have to download all the information of other users from the network first, and if the hard drive is not large enough, it is likely to burst the hard drive.

Lin Hong gave up this method. He changed the way to a more clever way, which is to save only the information of his friends in each client.

In other words, when you add a friend, all your messages will be synced to the other person, and the other person's information will be synced to you.

As a result, the amount of data to be saved is greatly reduced. Even if a person has a thousand friends, the size of the encrypted and then compressed information can be affordable.

However, in this case, there will be some situations. For example, if someone has very few friends and these friends are not online all year round, if their local data is lost, they are likely to lose their account and password.

However, Lin Hong thought about it, if there is no friend of the user, then it is not a user at all, and it makes no sense to keep this account, if you want to use this software again, then you can re-register an account, and let the previous account be completely scrapped

In the place where the account is initially kept, one or two "directory servers" can be randomly selected to be saved, and after a period of time, the data will be completely destroyed to prevent it from being obtained by people with bad intentions to achieve bad purposes.

Originally, this was just a very simple piece of software, but in order to make it have enough confidentiality and security, Lin Hong increased its complexity by a whole level, which can be described as racking his brains and trying his best.

In the end, the program is divided into two parts, one part is the "directory server", which is dedicated to storing the node topology and the initial registration information.

The other part is the "client", which of course also integrates the brokering service function. "" net

In the morning, the prototype of the new CQCQ was written.

Lin Hong logged in to the old version of the software with great interest, wanting to tell Linus the news, but after going online, he remembered that the other party had already gone to the army.

So, he logged on to SAM's official BBS and wrote a detailed introduction to this software, thinking that it would be released to the outside world, so that everyone could help test and use it.

However, when his finger touched the enter key, he still didn't press it.

This software was designed by Lin Hong himself, so he naturally knows what kind of impact it will have on the online world once it is released, and even the impact on the real world.

It's a double-edged sword, hackers can use it to communicate freely, and criminals can use it to do something illegal, which is certainly great news for them.

But that's bad news for governments. It is to be expected that this software will be strongly opposed and banned by these people.

Lin Hong took back the hand that was placed on the enter key, sat in front of the computer and thought for a long time, and finally pressed the backspace key and deleted all the content just written.

Just now he simulated in his mind what would happen once the software became popular.

The end result of the simulation is that you may be invited to coffee by someone from the FBI, or live an incognito life in exile like Kevin.

He can't afford either of these situations for the time being, and he doesn't want to be strangled in the cradle before the software grows for this reason.

Now Lin Hong has begun to have the consciousness of hiding his identity, which Kevin has already told him, he doesn't want his name to appear on the FBI blacklist.

"Hey!"

Lin Hong sighed, now he is really a little depressed.

It took me a whole day and a night to write this software, but I didn't have the courage to release it, which was really frustrating. I don't know if there are any such examples in the history of computer development.

Lin Hong thought about it for a long time, and finally thought of a very sneaky way, that is, to hack into a few servers, install the directory server on the server first, and then find a way to publish the post anonymously for everyone to download and use.

But now Lin Hong is not very familiar with the technology of invasion, if he does this, it is easy to be dug up, and when the time comes, he will accidentally be exposed, and the result will be directly released by himself.

"Looks like we're going to have to spend some time researching the intrusion technology."

Although Lin Hong felt that he should also learn the intrusion technology before, it was based on the idea of preventing others from intruding, and the need was not very urgent, but now it seems that mastering the network intrusion technology is sometimes much more convenient to do things.

He looked at the time, there was still half an hour before the morning exercise, and he continued to work on the software.

It is obviously not appropriate to rename it CQCQ.

He decided to give the software a new name.

Originally, according to its structure, Lin Hong wanted to name it "sugar gourd", which means that the information jumps through multiple nodes and finally reaches the destination. But after thinking about it, I knew that it must be software written by Chinese when I looked at the name, and suddenly the scope of the author was greatly narrowed, and I gave up after thinking about it.

The final name was set as "bit_couri" and "Bit Messenger", abbreviated as "BC".

Unlike CQCQ, Bit Messenger no longer uses a series of numbers to represent IDs, but instead uses a series of hashed strings without any regularity, which contain numbers and letters, and are case-sensitive, up to thirteen bits in total, called BC addresses.

This is calculated by the hash encryption algorithm through secondary encryption, in the rules of bit messenger, it is unique, each person has a unique BC address, through which you can add each other as friends.

The purpose of this is that Lin Hong does not want others to simply traverse all accounts by adding them up in numerical order, so as to avoid large-scale brute-force password cracking attacks.

However, it is obvious that the BC address is too difficult to remember, and it can only be operated by copying and pasting, in Lin Hong's imagination, the initial users of Bit Messenger should be those users or hackers who understand computer technology, and only they have this kind of demand for the time being. As for the criminal gangs, they are not in his consideration at all, and of course, if these people also have computer skills, then you are in luck and can find a fairly secure means of communication.

In addition, Lin Hong has integrated the automatic update technology into Bit Messenger, so that once a new version is released, the whole network client will be able to choose whether to automatically upgrade.

Since Bitmessenger itself uses peer-to-peer technology, it will be very convenient to download the upgrade, and when a client downloads the upgrade program, it immediately becomes a download source that can provide download services for others. The more clients, the faster the download speed.

Theoretically speaking, the bit messenger is completely out of anyone's control, and once Lin Hong releases it, he immediately loses control over the bit messenger, and he can't listen to any node, or rather, no one can listen. It's a structure with no center, the whole world is flat, equal to each other, and no one can control whom.

However, Lin Hong still left a backdoor for himself, that is, the automatic update function. This is the only place where it is possible to control it. This feature can make the program more powerful or ineffective.

At the beginning, Lin Hong didn't have this design, but at the moment when he wanted to press the enter key, he suddenly had an inexplicable feeling in his heart, which couldn't be said to be excitement or fear, it was very complicated.

After much consideration, he decided to leave a backdoor for himself, as he really couldn't predict what the impact would be upon the program's release.

"If there's really no need for this program to exist, then let it go away." Lin Hong said to himself.