Twister: History
Please note this is an old version of this entry, which may differ significantly from the current revision.
Contributor:

Twister is an experimental peer-to-peer microblogging program. It is decentralized, meaning that no one is able to shut it down as there is no single point to attack. The system uses end-to-end encryption to safeguard communications. It is based on both BitTorrent and Bitcoin-like protocols and has been likened to a distributed version of Twitter.

  • end-to-end encryption
  • microblogging
  • peer-to-peer

1. Overview

Twister is a Twitter-like microblogging platform that utilizes the same blockchain technology as Bitcoin, and the file exchange method from BitTorrent, both based on P2P technologies.

Twister is experimental software in alpha phase, implemented as a distributed file sharing system. User registration and authentication is provided by a Bitcoin-like network, so it is completely distributed and does not depend on any central authority. Distribution of posts uses Kademlia distributed hash table (DHT) network and BitTorrent-like swarms, both provided by libtorrent.[1] Included versions of both Bitcoin and libtorrent are highly patched, and intentionally not interoperable with the already existing networks.

Miguel Freitas, aiming to build a censor-resistant public posting platform,[2] began development on Twister in July 2013 to address the concerns of free speech and privacy. Building off the work of Bitcoin and Bittorrent, he built the core structure in October 2013. Lucas Leal was hired to create HTML and CSS for the user interface, with Miguel writing required JavaScript code. 2,500 user accounts were registered in the first six days of operation.[3]

As a completely decentralized network, no one is capable of incapacitating Twister since there is not a unique point of attack to the system. Twister uses end-to-end encryption to protect the communications. Twister is designed to prevent other users from knowing a user's GSM localization, IP address, and who the user is following. Users can publish public messages as with other microblogging platforms, but when they send direct messages and private messages to other users, these are protected from unsolicited access.

2. History

The Brazilian computer engineer and programmer, Miguel Freitas, started developing the new social network after learning about the massive spy programs of the USA's National Security Agency (NSA), as revealed by the NSA whistleblower Edward Snowden. He started to worry about the accessibility of that amount of information under the control of a single company under American jurisdiction.

According to Freitas, Twitter is the social network that has been most prominent in promoting democracy and organizing protests. Freitas built Twister using on privacy-preserving technology due to the risks involved in providing personal information on social networks in light of the mass surveillance conducted by the NSA.

Freitas and his developer, Leal, built the alpha version of the application for Android, Linux and OS X. Versions for Windows and iPhone are not planned, but as it is open source anyone can create alternative operating system versions for the application.

Even though the project is in alpha phase at the moment, Brian Armstrong, co-founder of Coinbase, believes that it is a great example of how the open protocol of Bitcoin can be used with diverse purposes.

3. Technology

3.1. Protocols

Twister is a distributed system, it works as a peer-to-peer program. Unlike other decentralized networks (like pump.io/Identi.ca, StatusNet/GNU social or Diaspora), it does not require the user to use their own server and does not require a user to trust a third-party server in order to use it.

Bitcoin

This is achieved through the Bitcoin protocol, though not through the network used by the cryptocurrency. The protocol handles the registration of users. In the same way miners verify transactions on the Bitcoin network to combat double spending, the Twister network verifies the users' names and that the message posted by a specific user is really from that user.

BitTorrent

The messages are driven through the BitTorrent protocol. This allows for a distribution system of a great number of messages along the network in a fast and efficient way; and also, allows the users to receive notifications almost instantly about new messages and alerts – all without the need for a central server.

Since Twister uses end-to-end encryption, if intercepted, the private direct messages cannot be read by any other person apart from the addressee. The code used is the elliptic curve cryptography (different from the one used by the NSA) that is used in Bitcoin. It is thought to give a security level similar to a RSA code of 3072 bits. The data is not stored anywhere, so it cannot be used by any other cut. As a consequence, if a user loses their entry password, it is impossible for them to access their private messages.

Because it is a peer-to-peer system, there is not a central server from which the publications may be compiled (see PRISM).

As Freitas explains, the system is designed in a way that the users cannot know if the other is online, their IP address, or what messages have been read. This information is not registered anywhere. Despite this, Freitas warns users that total anonymity may not be possible depending on the circumstances.

3.2. Platforms

Twister was developed under the Linux environment, migrated successfully to Android and OS X.

One of the long-term objectives of the program is to move the whole cryptographic code of the implementation to the interface of the user of the browser. This way, users would be capable of accessing Twister through any client platform that they use, choosing any third-party server and still maintaining the security of their private passwords at all times.

4. Functionality

The first Twister prototype is intended to reproduce the basic characteristics of any microblogging platform, including:

  • Searching users and profiles of navigation
  • Follow/unfollow
  • Sending text messages limited to 140 characters
  • Broadcasting and answering messages
  • Browsing through mailing routes, mentions, hashtags and direct messages (private)

Private messages require the addressee to following of the speaker, which is a common requisite in most of the existing platforms.

Some other characteristics can be difficult to implement in a completely decentralized system, requiring more effort. This includes the arbitrary register of the words in the posts and the recompilation of hashtags to find out the main tendencies.

5. Security

Twister uses the same parameters of elliptic curves as Bitcoin: secp256k1. This is not the curve that was implicated by the NSA, called sec256r1. A 256 bits of public-key cryptography, ECC must proportionate a security similar to a key RSA of 3072 bits (at least that is what is said by the experts) .

They usually stimulate the people who try to break the security in the systems with something that everyone desires, money. There are millions of $ USD on the table, coded with keys secp256k1 Bitcoin.

The direct application of messages encoding is based on an example code that was published on the Internet by Ladar Levison of Lavabit. It is known that Ladar took his service down because he denied cooperating with the US government that allows the control of all its clients.

5.1. Decentralized Net

Twister is a peer-to-peer microblogging platform with communication established between computers without going through a central node.

5.2. Censored

People who run a node can delete a user's posts in the DHT, but not block the user's account.

5.3. Completely Private

Due to the fact that the messages are sent directly from user to user in an encrypted way, the messages travel in a private way through the web as a black-box, and all IP directions are protected.

5.4. Anonymity

In this application, the IP address is not recorded at any time, which avoids being tracked by an entity or company.

According to Freitas, this guarantees anonymity but does not mean that the IP address will not be detected from the ISP (Internet service provider); rather, it means the content of the message will not be visible except to someone who can decrypt it, breaking the algorithms.

In order to be 100% anonymous, the user would have to use a browser that masks the IP address, such as Tor or similar.

The content is sourced from: https://handwiki.org/wiki/Software:Twister

References

  1. Hasslberger, Sepp (26 January 2014). "Coming soon: Twister – a distributed p2p microblogging platform". P2P Foundation Blog. http://blog.p2pfoundation.net/coming-soon-twister-a-distributed-p2p-microblogging-platform/2014/01/26. Retrieved 28 February 2014. 
  2. Miguel, Freitas (7 January 2014). "Twister: The Fully Decentralized P2P Microblogging Platform". Slashdot. http://tech.slashdot.org/story/14/01/07/161257/twister-the-fully-decentralized-p2p-microblogging-platform. Retrieved 28 February 2014. 
  3. "Twister: The Fully Decentralized P2P Microblogging Platform". http://slashdot.org.+2014-01-08. http://tech-beta.slashdot.org/story/14/01/07/161257/twister-the-fully-decentralized-p2p-microblogging-platform;. Retrieved 2014-01-11. 
More
This entry is offline, you can click here to edit this entry!
Video Production Service