WASTE Again!

February 7, 2009
57 Views

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated…  

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

and the features include-

 

image

Ajay- It is based on the same historical legacy of the PGP ( Pretty Good Privacy) project of the early 1990’s and offers up to 4096 bits of encryption. It offers a simple intuitive interface for a 4-step process in creating private and public key. Combine some John Le Carre novels tradecraft, one-touch keypads and residual creativity 🙂  and your network is securely assured from goodwill hunting.

The downloads are here-http://wasteagain.sourceforge.net/downloads.shtml

image

You may be interested

Education and the Blockchain – Should We be Teaching Blockchain in Schools?
IT
55 shares509 views
IT
55 shares509 views

Education and the Blockchain – Should We be Teaching Blockchain in Schools?

Glen Allard - July 26, 2017

It goes without saying that tech progress is moving at a rapid pace. Futurists point to Moore’s law – the…

5 Effective Strategies for Boosting IoT Security
Internet of Things
79 shares1,468 views
Internet of Things
79 shares1,468 views

5 Effective Strategies for Boosting IoT Security

Ryan Kh - July 25, 2017

With the emergence of IoT devices that are being rolled out from time to time, the serious IoT security issues…

The Future of Healthcare and Big Pharma is in Big Data Analytics
Analytics
774 views
Analytics
774 views

The Future of Healthcare and Big Pharma is in Big Data Analytics

riteshmehta - July 25, 2017

The healthcare industry recognizes that Big Data as and opportunity and a challenge for the whole sector. Nevertheless, systems and…