Secure Communication
Secure Communication
Communication on the Internet is continuously subject to the risk of being intercepted. We show you how to eliminate curious eavesdroppers.
The Retroshare communication platform licensed under the GPL ensures a secure exchange of data at all levels. The program is easy to use and offers some special features, such as integration of the Tor network. The software is also available for download for all popular operating systems.
Communication on the Internet always entails the risk of someone listening in. Many users thus look for easy-to-use encryption methods. However, because of the numerous forms of communication on the web, each with its own protocol and data transmission path, no standard solution suffices.
Moreover, most services are based on client-server architectures, wherein the server, as the central data repository, is the preferred target of attack. Errors in server configuration – over which the user usually has no influence because it is often a centralized service operated by a commercial provider – can be misused as a gateway for malware and espionage software.
However, peer-to-peer networking is far more secure. To avoid the massive installation overhead caused by the different protocols and transmission paths, users are now turning to the graphical Retroshare platform, which combines multifunctional communication in a uniform interface.
Operations
Retroshare [1], under development since 2006 and licensed under the GNU GPL, is a friend-to-friend network (F2F) [2]. In principle, it works like a peer-to-peer network without a central server instance, the difference being that the participants communicate with each other on a basis of trust.
To ensure a certain basic trust, communication between two Retroshare participants requires the exchange of their RSA keys generated by the software itself. The application also supports what is known as turtle hopping [3].
This form of communication distributes files and information across multiple computer systems on the Retroshare network, even if the source and target computers are not directly known to each other or have not authenticated each other with a mutually stored public key.
However, a maximum of seven forwarding nodes between the source and target computers knows the systems from which they receive data and information directly and the neighboring nodes to which they pass content. This process ensures a chain of paired computers that know and have authenticated each other so that man-in-the-middle attacks can be ruled out. Because the transport route and the data are encrypted by OpenSSL and OpenPGP, data security is very high.
Versatile
Retroshare is available in many places; for example, you will find it in the software repositories of many Linux distributions: ALT Linux, Slackware, Gentoo, and ROSA Linux maintain their own packages, and the project's website [1] provides various links to repositories for Arch, Debian, CentOS, Fedora, Mageia, Ubuntu, openSUSE, and others.
If you fail to find a suitable package despite this selection, you can pick up two AppImages and the source code, which can be launched on practically any Linux system; they share the ability to run only on 64-bit hardware. The binaries maintained in the package managers, on the other hand, are also usually suitable for 32-bit environments. Two AppImages exist for ARMv7- and ARMv8-based computers like the Raspberry Pi, as well.
Installation
To install distribution-specific packages, follow the instructions in the Download section on the project's website. In both cases, the software adds a launcher to the start menu. To load the AppImage initially, it needs execute permissions, which you can assign with the chmod +x
command.
After starting, Retroshare displays a graphical wizard in which you enter some personal data to create a user account, including a username, password, and a name for your node in the initial screen. Finally, you generate a PGP key with a preset length of 2,048 bits (Figure 1) by moving your mouse randomly.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.
-
Kodi 21.0 Open-Source Entertainment Hub Released
After a year of development, the award-winning Kodi cross-platform, media center software is now available with many new additions and improvements.
-
Linux Usage Increases in Two Key Areas
If market share is your thing, you'll be happy to know that Linux is on the rise in two areas that, if they keep climbing, could have serious meaning for Linux's future.
-
Vulnerability Discovered in xz Libraries
An urgent alert for Fedora 40 has been posted and users should pay attention.
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.