Secure Communication Channels Over Any Network With Telehash28 Feb 2014
Much like after 911, things will never be the same on the Internet after the Snowden-NSA revelations. Our delusional belief that the Internet is by default “open”, has been crushed, and corporate and government surveillance is now an expected part of daily life--there is no going back! To help me move forward, I'm exporing possibilities for what is next, which has led me back to a communication protocol called Telehash.
I first learned about Telehash several years ago, as I was doing the same research on the future of APIs, and in 2014 I’m picking up where I lef off with my education. My friend Jeremie is working hard on pushing the communication protocol forward, and e needs help funding his work, as well as attracting active technical contributors—I am doing what I do best, tell stories around what is possible with Telehash.
There are several key characteristics of Telehash that stand out for me, and make it something I can't get out of my head:
- Communication channels are encrypted all the time - there is no unencrypted mode
- Each application instance or device generates its own public/private keypair, they cannot be impersonated and security is not dependent on trust in certificate authorities
- Network addresses are generated from public key fingerprints, not centrally managed as with IP addresses
- Routing is based on a globally distributed hash table (DHT), not a central authority or managed hierarchy
- Uses a dual JSON/binary packet format
- Bindings to Bluetooth, IEEE 802.15.4, and other low-layer transports are also on the way
You see all of the elements of what is needed for a next generation communication protocol in there. This isn’t just about privacy and security, it is about us defining our own networks, whether that is on existing Internet infrastructure or adhoc device or an Internet of Things (IoT) defined network.
Telehash is not just some random side project, it is the complete focus of Jeremie (@jeremie), who also helped found Jabber/XMPP, which is the backbone of common messaging apps today, including the now infamous WhatsApp that Facebook just acquired for $19B. Telehash is building on what we already know, but introducing the key ingredients we WILL depend on for messaging in the future.
As I did with Telehash Node Runners in Egypt, I’m going to continue to craft stories that help us understand how Telehash can be applied, which is already pushing my understanding of what a network can and should be, and how us humans, and our devices can safely communicate on the open Internet, as well as our own privately defined, trusted networks.