Free Speech Worldwide

Privacy: A Natural Right to Free Speech

Most organizations (e.g. technology, banks, governments) track, persist, and use our behavior for their gain.

Centralized organizations are major targets for theft.

Closed source software can easily contain hidden back doors for thieves to access our information without our knowledge and many open source applications have closed source libraries embedded in them.

Smart phones, our primary means of global communication and collaboration, are weak in maintaining our anonymity and privacy - critical to ensuring individual freedom.

Many messaging applications exist but none have the means to ensure our privacy is maintained.

Dgramz is a secure open-source decentralized peer-to-peer messaging application running over the 1M5 privacy network with end-to-end encryption by default requiring no server connections protecting your communications and personal data from unjust interception, theft, monitoring, and censorship yet isolating unethical actors.

A note on privacy.
Some wish to argue against private communications due to a few aggressive behaviors, e.g. child abuse, terrorism, extortion.
These behaviors do not justify attempting to take away everyone's privacy.
People engaging in these poor behaviors can be found and brought to justice by others means.
Policing of poor behavior must be done within our communities,
not unethically through mass surveillance.
If it's not acceptable for us to have a government agent or identity thief by our side 24/7 to watch our every move and
hear every conversation with someone else, why should we feel it's ok when it's electronic?
Online privacy is no different than offline privacy.

No back-doors are placed in Dgramz as it would make it exploitable by anyone with the knowledge to do so
making it one more tool promising privacy yet failing to deliver.

"Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety."
-Benjamin Franklin

"When you abandon freedom to achieve security, you lose both and deserve neither."
-Thomas Jefferson

"Arguing that you don't care about the right to privacy because you have nothing to hide
is no different than saying you don't care about free speech because you have nothing to say."
-Edward Snowden

"Nobody needs to justify why they 'need' a right. The burden of justification falls
on the one seeking to infringe upon the right. If one person chooses to disregard
their right to privacy, that doesn't automatically mean everyone should follow
suit, either. You can't give away the rights of others because they're not
useful to you. More simply, the majority cannot vote away the natural
rights of the minority."
-Edward Snowden


Why Dgramz?

Market Comparisons

 Signal

  • An encrypted communications application using the Internet to send one-to-one and group messages, which can include files, voice notes, images and videos, and make one-to-one voice and video calls.

Pros

  • Double Ratchet Key Management
  • End-to-End Encryption
  • AGPLv3 Clients
  • GPLV3 Servers
  • Encrypted Voice Calls
  • Encrypted Video Calls
  • Chrome browser plugin for desktop convenience

Cons

  • Unable to find all source code
  • Clients have proprietary dependencies
  • Uses servers
  • Not running on anonymous network
  • No wireless mesh support
  • Uses cellular numbers for identification

Differences

  • All source on Github
  • No proprietary dependencies
  • NO servers used, only P2P
  • Unlicensed - All in Public Domain
  • Anonymous Network (I2P/Tor)
  • Uses public keys with Alias for identification
  • Voice Messages (Future)
  • Mesh Support (Future)
  • Voice Calls (Future)
  • Video Calls (Future)

 Telegram

  • A non-profit cloud-based instant messaging service

Pros

  • Claimed Fastest on Market
  • Optional End-to-End Encryption
  • Self-Destruct Messages
  • Remote Delete Messages
  • Photo Editing
  • Clients are GPLv3
  • Voice Messaging
  • Voice Calls
  • Video Calls

Cons

  • Clients contain binary blobs
  • Uses Servers and those have proprietary license
  • Custom unproven security protocol
  • End-to-End Encryption not default
  • Messages stored on servers
  • Collects email address
  • Uses cellular numbers for identification
  • Supports Bots

Differences

  • Fully AGPLv3
  • NO servers used, only P2P
  • Anonymous Network (I2P)
  • Full source on GitHub
  • End-to-End Encryption Always On
  • Proven security protocols

 FB Messenger

  • Facebook has quite a large user base and thus makes it easy to connect and communicate with those you know. But it comes at a price - your privacy.

Pros

  • Ubiquity
  • Convenience
  • Bundled with FB
  • Optional end-to-end encyption in 'secret' mode

Cons

  • FB owns your data
  • Little privacy
  • Runs over clearnet (although FB has a Tor hidden service)
  • End-to-End Encryption not default
  • Messages stored on servers

Differences

  • You and only you own your data
  • Full Privacy
  • You can easily invite your friends on FB
Features

How does it work?

The app is a JVM (Java Virtual Machine) application downloaded from this site when available. It uses public/private key pairs similar to other end-to-end encrypted messaging apps. These keys are provided by your identity keys on your Puri.sm Key Ring (USB key).

Contacts are added in-person (the most secure) or over video chat using your phone's camera with QR codes where public keys are exchanged and approved. This ensures you both agree that the public keys represent each other.

Conversations can now happen securely. Additional features to come.

Always On End-to-End Encryption

Each and every message is encrypted in the sender's application and decrypted in the receiver's application.

Open Source Application

In an effort to keep the source code in the public domain and prevent corporate takeover, Dgramz uses the popular open source license GPLv3.

Open Source Operating System

End-to-end encryption is worthless if being used in closed source operating systems as once the application decrypts the message, the operating system could keep a copy of it for later viewing through a back-door or get a copy prior to encryption by the application. This is why Dgramz only uses open source operating systems. Today that is Linux and Puri.sm's Debian Linux based PureOS is the leader.

Anonymous Intelligent Network (1M5)

A network privacy router that acts as an intelligent anonymous layer for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's content (by using end-to-end encryption) sending it through a volunteer-run network of 75k+ computers distributed around the world using onion/garlic-routing which is indirect routing with layered encryption of communications.

Self-Sovereign Identity

Own and control your identity through a Decentralized IDentifier (DID)

Proven Security Algorithms

2048bit ElGamal/AES256/SHA256 Session Tags and Ed25519 EdDSA/ECDSA signatures. Optional encryption algorithms can be selected including those for quantum computing protection (NTRU).

Self-Destruct Messages (Future)

Set timers on messages so that they automatically delete upon expiration.

Remote Delete Messages (Future)

Deleting messages locally can include deleting them on the applications that also received them.

One Time Pad Messages (Future)

Large pad sources are exchanged when two people who want to use this feature bringing their devices close using NFC. A portion of these pads are used to encrypt each message sent between the two people until the pad sources are spent requiring another phone physical 'meeting'. More information on one-time pads.

Double Ratchet Key Management (Future)

After an initial key exchange it manages the ongoing renewal and maintenance of short-lived session keys. It combines a cryptographic ratchet based on the Diffie–Hellman key exchange (DH) and a ratchet based on a key derivation function (KDF) like a hash function.

Direct Wireless Mesh Network (Future)

A wireless ad hoc communications network among personal devices organized in a direct mesh topology where the personal devices are the only hardware providing the network routing.

Tokens

Prana

Prana tokens accumulate within the application over time as its used for relaying messages through 1M5, Dgramz's underlying network. Each message routed results in the acquisition of one Prana token. Each message sent requires one Prana Token per relay used plus transaction fee (normally 0.5%). In the future they will be offered for purchase by crypto currencies using the Dgramz mobile app with 1M5 maintaining privacy to allow users to offer their resources for crypto currencies.

Aten

Aten tokens are provided to compensate development. They determine how the transaction fee is distributed amongst the development team. One token is roughly equal to one hour of work by a novice developer. They are provided in the form of bounties.

Roadmap

Roadmap

0.3 - Email

Email messages through I2P Bote network.

2018 3rd Qtr
In Progress

0.5 - Prana Tokenization

Prana + Key Ring for tokenizing messages.

Est 2018 4th Qtr
In Progress

0.7 - Aten Tokenization

Aten token for gaining development resources.

Est 2018 4th Qtr

1.0 - Messaging

Real-time messages through I2P network.

Est 2019 1st Qtr

1.x - Message Features

Self-Destruct, Remote Delete, One-Time Pad

Est 2019 2nd Qtr

2.x - Voice Messages

Add voice

Est 2020

3.x - Video Messages

Add video

Est 2021

4.x - Groups

Add Group support including photos

Est 2022

5.x - Pub/Sub w/Photos

Instagram Replacement

Est 2022

6.x - Hi Scale Pub/Sub

Twitter Replacement

Est 2023

7.x - Wireless Mesh

Direct P2P communications

Est 2024

8.x - Voice Calls

Add voice calls

Est 2025

9.x - Video Calls

Add video calls

Est 2026

10.x - Streaming Video

Streaming video similar to YouTube but smarter

Est 2027

Team
Decentralization Software Architect / Cypherpunk / Freedom Activist / Voluntaryist. Over 20 years developing software as a Software Architect, from bootstrapped startups to Fortune 100 enterprises, specializing in distributed computing, scalability, security, and real-time analytics, focusing on intelligence assistance, decentralization, personal privacy, code/governance transparency, and open sourcing all aspects of computing promoting voluntary transparent relationships and private personal lifestyles for all.
Providing value toward the advancement of new, innovative projects that help change peoples lives for the better brews passion and excitement in me. Whether I'm providing technical customer service, re-defining business processes for success, arranging a Win / Win agreement, or preparing products or services for launch- once on board, I'm in it to win it.
Technical liaison in business discussions and agile collaborator with development teams. Entrepreneurial drive with a systems mindset, looking for opportunities to assist businesses and improve the world's well-being.