Learn Before
Concept
Online Messaging
Once a person has the other's public key, they can create a path towards them by querying the DHT of any service node and obtaining the introduction set corresponding with the other's public key. Once finding the introduction set, the initial user can choose three random Service Nodes to act as an intermediary hops between their and the receivers. The path is now established, and the two can exchange messages with high level privacy.
0
1
Updated 2021-11-17
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science