Experimental browser for the Atmosphere
{ "uri": "at://did:plc:wtk7wq3y3i64z3umv44eutuj/com.whtwnd.blog.entry/3lmfsohpopg2e", "cid": "bafyreieezpzr2qstrtltn7ghvl3qiee2fzmpyinvm5ctkgz6hjspe6inqa", "value": { "$type": "com.whtwnd.blog.entry", "blobs": [ { "name": "bourbon_network.webp", "blobref": { "$type": "blob", "ref": { "$link": "bafkreidpbgqwfvjquha2qsziunzbg6w5glkdihglva54n2dpcistf2327i" }, "mimeType": "image/webp", "size": 66524 }, "encoding": "image/webp" } ], "theme": "github-light", "title": "Bourbon Protocol — A Secure “Sipping” Protocol For Mobile Subscribers", "content": "# Bourbon Protocol — A Secure “Sipping” Protocol For Mobile Subscribers\n\n\n\nIn the fall of 2024 it [was reported](https://www.politico.com/news/2024/12/27/chinese-hackers-telco-access-00196082) that a Chinese hacker group called Salt Typhoon “gained access to U.S. telecommunications networks in a sweeping cybersecurity breach and were able to use their positioning to geolocate millions of individuals and record phone calls at will”.\n\nThis was a catastrophic national security breach and should motivate every American to demand a radical overhaul of our telephony networks’ architecture. The deliberate introduction of backdoors for law enforcement and insecurity of the voice and SMS infrastructure has enabled sophisticated hacker groups to compromise the intimate location and message data of virtually all Americans, leaving our collective privacy and security in tatters.\n\nIn response to this attack, we’re introducing the Bourbon Protocol, a groundbreaking initiative aimed at revolutionizing mobile communications. Our goal is to deploy a cutting-edge protocol that existing Mobile Network Operators and business VoIP services providers can seamlessly integrate, effectively upgrading their entire subscriber base to a private and secure network.\n\nThe Bourbon Protocol is a decentralized, end-to-end encrypted protocol that enables secure voice, video, and messaging, while maintaining seamless compatibility with the existing SMS and voice network infrastructure. On the Bourbon Protocol Network accounts are self-sovereign, decentralized identities, where subscribers retain full control over the cryptographic keys that secure their communications. The network supports porting in traditional phone numbers, which can be used as unique identifiers in conjunction with DNS or ENS names, providing users with flexibility and choice in managing their digital presence.\n\nWith Bourbon Protocol, we can harness the network effect of the existing phone-based system, while ensuring that our communications are secure, private, and resilient against cyber threats.\n\n**Here are the key properties of a new network, based on the Bourbon Protocol:**\n- Multipolar communications network similar to email and current phone network where many different stakeholders operate the network.\n- Users have a decentralized account (DID) using either Bluesky or Farcaster.\nPhone numbers can be ported and used on the Bourbon Network\n- Bourbon Protocol Applications look up the phone number on the Bourbon Network, if found, they use the Bourbon Protocol to privately communicate with the number. If not, messages and calls use a gateway to the legacy telephony network.\n- As more users port their numbers into the network, more communications are made secure and private.\nThe Bourbon Protocol does not require a phone number. It can also use DNS or ENS to look up other subscribers. Phone numbers are only required to call and text legacy subscribers that have not yet upgraded to use the Bourbon Protocol.\n\n[More details about the Bourbon Protocol](https://whtwnd.com/boscolo.co/3lmfwsuibx42w)\n\n#### Join Our Mission\nOur mission is to replace the existing insecure voice and SMS network with a new decentralized Signal-like network. [Join us](https://form.typeform.com/to/uBcLRI7j)!", "createdAt": "2025-04-09T21:50:43.643Z", "visibility": "author" } }