Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 153 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 20 tok/s Pro
GPT-5 High 28 tok/s Pro
GPT-4o 79 tok/s Pro
Kimi K2 198 tok/s Pro
GPT OSS 120B 428 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

fybrrChat: A Distributed Chat Application for Secure P2P Messaging (2207.02487v1)

Published 6 Jul 2022 in cs.SI and cs.NI

Abstract: The growing demand for connecting with each other across the world has proved to be a boon to the growth of social media platforms. But when it comes to ensuring the privacy and security of the platform, the control is in hands of few monopolies. Some claim to provide a secure medium of communication but their exploitation of users and misusing users' data with their centralized control over the policies has led to various controversies. Lack of trust towards these organisations have made people skeptical towards using these applications for extremely secure communication use-cases. Thus, a system with no central organisation in control and a trustless network is required. A trustless network is a network which does not requires the participants (users) to trust any central authority. These nodes themselves, as a group, can be trusted to make a decision which aligns with the interests of all. This is accompanied by a distributed network, where peers are connected to each other to form a mesh-like network called Swarm. This distributed network of connected peers is often attributed as the internet of tomorrow. The total number of monthly active users on the top 3 chat applications surpassed 4 billion users in July 2019. As of Oct 2020, WhatsApp alone has 2 billion monthly active users sending around 100 billion messages per day. With such vast number of people relying on chat applications, making these applications highly secure becomes a task of paramount importance.

Citations (1)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.