Your email address it is just an identifier for Confidant Mail, you can use an email address or domain name that does not exist if you like, it will still work. When you get an email from somebody Confidant Mail automatically fetches the public encryption key for that address and adds it to your keyring, there is no central key directory that can be compromised, you can run Confidant Mail in peer to peer mode. At present there is no key verification built-in, you have to manually check the fingerprint shown to the right of the address.Ĭonfidant Mail Tor and I2P proxy settings
Being this a new email system that is not compatible with current SMTP email providers, this is where it gets tricky, it is not easy to find a Confidant Mail provider, you will have to use one of the developer test servers or set up your own and the person you communicate with will have to be using the same email system. I downloaded the Windows installer, there is an easy set up option, you enter the email address you currently have, choose a passphrase for your private GPG key and paste a remote configuration URL that your Confidant Mail provider will have given you. There is spam protection making it computational costly to send bulk email, digital signatures are checked before forwarding messages, a user can change server without needing a new email address, mail servers can be run at home with a dynamic DNS with servers paired for redundancy, messages can be made traffic analysis resistant delaying sending of messages with the AFTER command, and there is built-in support for sending email with Tor and I2P to hide your computer IP. There are several platforms that enable sending one bit messages including Yo and the Facebook poke.Confidant Mail encrypted email configuration Fear of follow-up: "What if the person I message will want to meet? I don't want to meet him.".Unwillingness to type: "I'm on my mobile, and don't want to type".Fear of a conversation of unpredictable length: "I have time for a short chat, but how do I cut off if the conversation develops?".Lack of topic: "I simply want to say to my friend that I thought of her, without anything specific to say.".Topic overload: "So many topics to talk about, which one should I start with?".
Fear of being ignored: "What if I message her, and she doesn't respond or goes offline immediately?".Fear of inconveniencing someone: "A messenger shows that the other person is available, but maybe he is actually busy.".Fear of rejection: "What if the other person replies "sorry, I'm in the middle of something"?".Fear of initiation: "How should I kick off the conversation? It's a daunting task.".In the online world one bit messages solve a set of communication initiative problems: One-bit messages can be used to communicate the outcome of situations with two potential outcomes, such as a coin toss.
Telephone calls which are deliberately terminated before being answered are also an example of one-bit communication. Examples of one-bit messages in the real world include the sound of car horns, police sirens, and "open" signs. Marc Andreessen describes "one-bit communication" as having no content other than that it exists. It signals an intent and a thought, but does not specify what it is. A one-bit message is a type of communication that has no personalized or specified content, and as such transmits only a single binary bit of information.