Dotcom Announced End-to-End Encrypted Voice ChatAdded: Friday, February 13th, 2015
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Dotcom’s encrypted cyberlocker Mega has announced free end-to-end encrypted voice and video chat supported through the web browser. New MegaChat promises to keep users’ video chats secure and private, and is dubbed a “Skype killer” by its creator.
The New Zealand entrepreneur announced the step-by-step release of #MegaChat, which currently offers video calling and is going to provide text chat and video conferencing soon as well. The service requires no software beyond an Internet browser to operate, unlike many other similar services. However, the developers also offered plugins for Google’s Chrome and Firefox for “faster loading and added resilience against attacks”.
MegaChat allows Internet users to share encrypted files after previously sharing a personal decryption key with them. Kim Dotcom is sure that no online service provider based in the United States can be trusted with data these days and Skype is no exception – it also must provide the American government with backdoors. Kim Dotcom pointed at Edward Snowden revelation of Microsoft providing the NSA access to encrypted messages.
Now Dotcom positions MegaChat as a secure alternative to Skype, which can’t be tracked by security services that use end-to-end encryption to keep privacy. MegaChat service is based in New Zealand. The MegaUpload founder also promised to offer encrypted video conferencing, email and text chat later.
In the meantime, the industry experts point out that Mega’s security credentials have been questioned previously. For example, user passwords were stolen from Mega shortly after its launch two years ago, which made security researchers question whether new Dotcom’s service could live up to its security promises.
Posted by: Date:
Friday, February 13th, 2015
|After selling out ninjavideo to the feds before his arrest and the subsequent stolen passwords/accounts of mega and the next appearance by the Feds due in June now would not be a time to trust Kim as well as Google servers already being hacked by the NSA being a prime consideration when looking for a trustworthy protocol.All linux users can already do encrypted key passing and secure tunnelling for data and messaging should they wish it trusting a third party plug ins in a not so secure browser to do the same may make bucks for Kim, but do not make the protocols any safer because it`s dotcoms,or should that be dotcomm`s. (:^D)|
|posted by (2015-02-13 19:47:37)|
|it sounds like the websites are playing to hide themselves and sharing to the nsa to getting secure access online sites codes for everybody even with snowden revelations to have secure it own business.|
|posted by (2015-02-13 22:41:32)|
|I use Telegram Messenger from telegram.org and I'm pretty much satisfy with speed, end-to-end encryption and overall => [email protected]! Plus the firm's owner has put up an award of $200,000 (£122,000) worth of Bitcoins for breaking the protocol. |
|If no governments complain about this then they already have the keys or can otherwise crack dotcom's junk|
|posted by (2015-02-14 08:06:21)|
|posted by (2015-02-15 01:20:03)|
|5 )- I so agree with poster 5 " Telegram Messenger " it sounds so awesome worth checking it out : )|
|posted by (2015-02-16 19:37:29)|
|Skype? someone actually use that crap.|
|Yes they probably can crack this and use keyloggers and malware and all the other tools they have to subvert security without actually cracking the encryption.|
If it's open source encryption they can put a back door in but being open source there's a chance it might get noticed. Closed source is harder for them to have a back door put into, but once there the company might never notice/correct it.
@3 Telegram uses AES encryption and it's known (via Ed Snowden) that the NSA had back doors built into all the common encryption protocols (like AES). Doesn't matter how big a key, end-to-end, 1028bit instead of 256 etc.- they have a back door built into it that may as well be an admin override password.
Ostel.co uses ZRTP end-to-end for SIP calls and ZRTP was created by the same guy that created PGP encryption. Maybe it's no more secure but it's less commonly used so maybe they don't have a back door there.
Most Popular Stories