Find a Question:
Secure chat service Megaupload founder comes in April
The encrypted chat and video calling service from Mega, the business of Megaupload founder Kim Dotcom, coming in April. Initially, it is just a web version, apps for Android and iOS to follow in August or September, says the Dutch Mega-developer Bram van der Kolk.
Mega The arrival of the end-to-end messaging service was announced, but Van der Kolk now promises that the service is integrated into the website of Mega storage service in April. “I do not want to be too optimistic, but I think the apps come in August or September,” Van der Kolk opposite Tweakers. With end-to-end encryption between chats chat partners are encrypted, and no access to the chat service communications.
The application is best comparable to a hybrid form of WhatsApp and Skype, according to Van der Kolk: it is both possible to chat, like to call, which also supports encrypted video chat. “It’s all true, end-to-end encrypted. Also we apply off the record date, “says van der Kolk. In addition, each conversation is a new cryptographic key is generated. “The moment you stop to chat, are therefore all the keys away.”
Van der Kolk is one of the suspects in the case against Megaupload. Early 2012 was MegaUpload taken by the New Zealand police from the air, on the orders of the FBI. Van der Kolk is allowed to await his trial in relative freedom. The U.S. government, which Megaupload suspects of copyright infringement, wants Van der Kolk and the co-defendants, including Kim Dotcom, be extradited. However, New Zealand judges strongly criticized the evidence. In April, the case continues.
The encrypted chat service should also let people who know nothing about cryptography, encrypted communication. “We want to make our application as accessible as possible, a user needs the encryption actually not notice:. It must feel like a normal service,” he says. Thus pursues the same objective as the app include Threema, Text and Secure Telegram.
Read the background on communicating really safe through end-to-end encryptionViewing:-321
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!