Čeněk Rauscher: „We use the bitcoin network for automatic key control"


Media presence

BabelApp press

Čeněk Rauscher: „We use the bitcoin network for automatic key control"

"You cannot get by today without encryption, and yet the majority of users still do not check whether they have the right encryption keys. That’s why we decided to use the bitcoin network in BabelApp for automatic key control," says Čeněk Rauscher, the mobile applications development lead in today’s interview for

Words like encryption and secure communication are showing up practically all the time when speaking about using the internet. So a person may think that writing messages and calling is secure. Is that the case?

You practically cannot get by on the internet today without encryption. Everything and everywhere is being encrypted. Companies like to boast about it, and that makes many users feel at ease. Even webpages are using secured communication; your browser is encrypting when it sends data. But that doesn’t mean if you send someone an email from your browser that nobody else other than the intended recipient can read it. In this case, only the path from you to the server and subsequently to the addressee of the email is encrypted. On the server, your message is decrypted, saved and accessible. Then it just depends on that server’s level of protection against hackers, intra-company policies against leaking of messages, rules of the country within which the server is located, and other factors.

Another thing is so-called end-to-end encryption. This means that a client application encrypts the data at the end device (such as a phone) and sends it to the recipient, and only this recipient is able to decrypt and read the message. Servers are used here only to transmit the message, and nobody who gets to the message along the way can read it.

Most of today’s communicators boast that they support end-to-end encryption. Does that imply that it is enough to choose one of them and then one doesn’t need to be worried about security of calls and messages anymore?

It is true that most communicators proclaim end-to-end encryption, and there is probably no reason to mistrust them. Unfortunately, though, the matter is not so simple. If you want to have encrypted communication with somebody, it is necessary to exchange encryption keys. Even though the server gives you some keys, how do you know that they do not belong to somebody else? That an “evil” administrator or hacker did not give you a different key for instance?

It’s similar as in the case of phone numbers. Imagine that you ask a “good friend” to give you the telephone number of his friend but instead he gives you his own number and does the same thing to that friend. You and that friend exchange messages in good faith that nobody is reading your private messages, but in reality all the messages are received by somebody else who not only reads and forwards the messages but also may be inconspicuously changing them. It is very difficult to recognize such altered communication, even though checking whether communication is secure is usually not that difficult.

The interview continues on  Čeněk Rauscher (OKsystem): Využíváme bitcoin pro ukládání šifrovacích klíčů -

Share this post on social networks















We use cookies to optimize site functionality and deliver best results based on your interests.

More info