
- #Bitmessage protocol how to
- #Bitmessage protocol Offline
- #Bitmessage protocol download
- #Bitmessage protocol windows
Here is a table comparing Bitmessage to other common messaging services. How does Bitmessage compare to other messaging methods Where can I find more documentation about Bitmessage After the POW is complete, your message is shared to all of your connections which in turn share it with all of their connections. Nodes and other clients will not process your message if it does not show sufficient POW. This POW helps mitigate spam on the network. When you send a message, your client must first compute a Proof of Work (POW). All of this data is exchanged between all of your connections to make sure that everyone has a copy. If any of these messages are bound for you, they will be shown in your inbox. In addition to the known nodes, you will also start receiving person-to-person messages, broadcasts, and public keys.

Each new node that you connect to shares its list of known nodes. When you first start Bitmessage, your client connects itself to the network and starts downloading a list of known nodes. Please refer to this article for a complete documentation of this rather complex feature. Subscriptions are also required to use a Mailing List.Ĭhan is another word for DML. Since broadcast messages are encrypted with a key, that can be created by everyone who knows the address, you must be subscribed to an address to actually read the messages. Nodes delete data, and do not accept data, older than 2 days.Ī subscription allows you to receive messages, that were broadcasted by the address you subscribe too.
#Bitmessage protocol Offline
However, if you go offline then they must come back online within 2 days of the message being sent. If your connection indicator is yellow, you can have a maximum of 8 connections.Ĭan I send a message to someone that is offline Usage How can I run Bitmessage in daemon modeĪs long as you have at least one connection, you can communicate with the network. Incoming connections from both clearnet and Tor

Incoming connections only through clearnet IP addresses and port number are just examples, adjust them if you have a different setup: The following table explains the settings combination for Bitmessage's keys.dat. In order to use it you have to manually add a new hidden service in your tor configuration. How do I setup Bitmessage as a hidden service on Torīitmessage can accept incoming connections as a Tor hidden service.

#Bitmessage protocol how to
Several examples of how to install Bitmessage on *nix and OSX platforms can be found in the forums.
#Bitmessage protocol windows
The start-on-boot and minimize-to-tray features are only implemented for Windows thus far.
#Bitmessage protocol download
You can find instructions to download and run bitmessage from the Main Page.Ī great write up for setting up and using Bitmessage on Windows can be found Here.īitmessage should run on any OS though it is only lightly tested on OSX. Installation and configuration How do I install Bitmessageīitmessage does not needs to be "installed". 5.2 I have not received a reply from the Echo Server.4 How does Bitmessage compare to other messaging methods.3.1 Where can I find more documentation about Bitmessage.2.3 Can I send a message to someone that is offline.2.1 How can I run Bitmessage in daemon mode.1.5 How do I setup Bitmessage as a hidden service on Tor.1.4 How do I setup Bitmessage to work with Tor.1.3 Why is my Connection Indicator Yellow.1.2 How do I become a node to help the network.
