Whisper MSG X Volare AMA — 2

Volare
Volare Network
Published in
4 min readMay 27, 2022

Hello! Great fans of Whisper MSG!
We are pleased to have another exciting opportunity to interact closely with our community participants.

What is Whisper MSG?

l Whisper MSG is the ultimate secure messenger app that successfully applies blockchain technology to a consumer-focused product.

l Under its global slogan, “Your privacy is our priority”, Whisper MSG is the most secured blockchain-based communication service to date, complete with a built-in digital wallet feature to effectively transfer and manage various digital assets right on the messenger.

l Whisper guarantees anonymity for messages and other information exchanges by not storing information on a central server, and automatically destroys and deletes messages through a self-destruct feature.

Addresses of Selected Question:

(0x1k7c652516c4410f6f75a3a8814f5de24430ae4e0cbebb+a032bfa9a62c9ef4c1361f8819f777642bcf331cbaf9fbfa41483d53d6d59a27

0x1kacee33fb7df521e4af05ee381562f3a934141469f1c7+21b77809afa2f8def2594d21d2a31f0d5e982e88a37e759facc2879b4f4a6865

0x1kdf78475585bb502e47550062a9f6ce9d139f886d7ccf+13d1b2d3342d3c0d5359a223f7292fc99b25fe1c8b7944bbf71b04b9fe87ba31

0x1kc8f24f0b90a01b10e5fbde91377d8c8fdefd87f0422c+cc40779914ed8d6363ac17ec2568f1e7c2eaec852281051e1f0de295dfe60e76)

What are the technological advantages of Whisper MSG?

The technical advantages of Whisper are as follows:

1) Message encryption

There are three main types of encryption methods.

First, one-way encryption is a method in which decryption is impossible when plaintext is encrypted, and an example thereof is hash. Usually, this method is often used for data source verification.

Secondly, in symmetric key encryption method, the plaintext is encrypted with a specific symmetric key, and the resulting ciphertext can also be decrypted with the same symmetric key. The advantage of this method is fast encryption processing time. However, when the symmetric key is delivered to the recipient, there is a possibility that the symmetric key can be hijacked by a middle attack.

Lastly, the asymmetric key encryption method, which can be divided into two types.

a). Plaintext -> Encrypt with private key -> Ciphertext -> Decrypt with public key -> Plaintext

Method a). is used as an electronic signature. This is because, if you sign with your private key, you can determine the authenticity of this digital signature by decrypting it with your public key.

b). Plaintext -> encryption with public key -> ciphertext -> decryption with private key -> plaintext

When designing Whisper, we have focused on concealing information while transferring the information on an open ledger, hence used the Method b).

Whisper MSG exchanges public keys and addresses with each other when adding friends. When the message content is encrypted with the sender’s private key and the receiver’s public key, it can only be decrypted with the receiver’s private key and the sender’s public key. This means that no one except the recipient can decrypt the message, assuming that the recipient’s private key is not disclosed.

In addition, the asymmetric key encryption method has the disadvantage of being slow because the key is long. To address these shortcomings, we have adopted an elliptic curve algorithm, which is an algorithm that provides the same level of security even with a shorter key compared to other asymmetric key encryption algorithms.

2) Mnemonic codes

Whisper provides Mnemonic codes to help users to easily remember their important private keys.

The origin of the word ‘Mnemonic’ is ‘to help make something easier to remember, or to be easily remembered’.

In other words, the mnemonic code is an algorithm that converts the user’s 64-digit private key into an array of 24 words to make it easier to remember. The method of generating the mnemonic code is as follows.

① Create a cryptographically random 256-bit sequence S1.

② Among the SHA-256 hash values ​​of S, the first 8 bits are used as the checksum.

③ Add S and the checksum created in step 2 to make S2 ​​with 264 bits.

④ S2 is cut into 11 bits and each 11 bits is replaced with a predefined word from a set of 2048 predefined words.

⑤ Generate a mnemonic code while maintaining order from a sequence of words.

The 24 ordered word list generated as the above replaces the 64-digit private key. This technology enhances user convenience by helping users to resume the service through the arrangement of words even when they forget their private key.

3) Smart contract scalability

The smart contracts used in Whisper were created according to certain intended functions. For example, smart contracts were written to function with information security as the prioritized objective.

SendMSG

“SendMSG” is a message transmission smart contract that sends an encrypted message with the recipient’s status.

ReadMSG

“ReadMSG” is a message deletion smart contract that deletes messages in the user’s status.

Addresses of Selected Question:

(0x1k46bbd5f9cc2cb4fcf624b13a632e86d90060bc3bccda+c7cbefba1e1dd662ea24816967f734a01eb4c0e7cf55e4010425977010bd6f69

0x1k508a98a8128b6fd8b97f47a83d2acbec4397de0798fb+40f97a557bc06f3857896e71c709e395cd484a0b95a216a59e41effeb768f36d

0x1k30e6ad785fbe4fcd98edb7934a2c47a036905d2e4377+dee475f0b0a8d9ade132a692fd0bc88947a3cd9cb3399c9a09988e8214f42e2d)

Is Whisper MSG safe?

Since Whisper does not have any information that can be specified in all user flows, it is impossible to identify users and leak related information.

In Whisper, the messages sent from the sender are deleted as soon as the recipient receives and confirm the messages. Therefore, there’s no message history left for the users to check later.

Addresses of Selected Question:

(0x1k5095eb179f85367b9ba7b1460fbaed14ec0a76450374+71bbbd74f47d4dc20f1482bd8846ca98df8d2c21bc167e0a87ebda91c471bc25

0x1k951dc2d1abd37c1736d573b373ddb974ac64c976882c+44a90b5225c5851819d8715f0cb433fc15f02b2fcfd29db7977d007c85ec0f09

0x1kdf78475585bb502e47550062a9f6ce9d139f886d7ccf+13d1b2d3342d3c0d5359a223f7292fc99b25fe1c8b7944bbf71b04b9fe87ba31)

What is Whisper MSG wallet?

Whisper Wallet allows management of various digital assets in one place and enables remittance between users. Users can exchange digital assets using Whisper Wallet that utilize Equilibrium engine technology. And as the Volare network expands, more gaming-related Dapps will be added to the network, thereby more digital assets can be managed through Wallet.

Addresses of Selected Question:

(0x1kc8893f2148eff0604e8c232c46a1c59425135c912a4c+6ad1f5b51e0a6c48b86ea1a7bab8dd8f4d1815c9b03cb46e91fa686a5ee61d07

0x1ka847ea4d18535325c56be1e31d78e4dba47c311605fb+71db16e9038a42b225450892609b31f33a4bd4535112c06d185d8ee708861011

0x1ka748fd81f9b15a9582ebc6ab1d0b7361229a11bb1964+68899ab275aaa21f587fcd6a0d8baa973566e44e13efda2e9f6ba24a6d8ff55b

0x1ke3fc03ccdcc9dca18c5761e5feff444f238b6913a995+8d120eb3151fbf11fa30acb128070ebbe08697bdd47f070e6fb75fc59f1ac12c

0x1kc27ae535e88ca09d90259cd6e9ed8938aca320d676c0+ac8080de597655456540be85f7673462a27f9552c58f0004e6a26bbed0dc755b)

What is the objective of Whisper MSG?

Currently, Whisper offers a secure messenger function, as well as a digital wallet function.

In the short-term, Whisper intends to offer these functions in better user-friendly interface, all in very secured environment.

In the future, we expect to see numerous Dapps joining the network to be connected through Whisper, while leaving personal information management and security to the users themselves.

Addresses of Selected Question:

(0x1kadc6591d0f8a88b038e3c490c52f81c9139f5992c475+1ef7cb285cdc29bc801b99336a09bb8ed55421180243a0720f40775a3c844a48

0x1kf530ff845bade9dffaab1789697336765879cd80fb5f+92e78e402bf9b67eeca196adfc09318f6bd438c9ef893588a866991b9cb65122

0x1kd2092e4807d5cc35dc16caa13c3c62d97574a890881f+6efd66a6270d44a79bc5a29d8602b0a1600a51a16cf4fc16d06b26e09cef6441

0x1k158fee0ea8d6da2ed78d24ee28843a0438f824ff5ed2+bbcf82193072948fa9fb3e2e67eb52cd6a976054d242bd93e1cf44a9687be51b)

We would like to wrap up this session and hope our explanations have answered most of your questions.
We will be posting answers to miscellaneous questions about Whisper MSG and Volare in three days, so please stay tune!
We thank you for your continued support and interest in Whisper MSG.

--

--