Tech

How This Sex Chat Site, Horny Chat, Is Making Their Site More Secure

Adult orientated parts of the internet are notoriously dangerous for your computer, since especially in the earlier years of the internet, it was easy to get computer viruses there. In more modern times, that’s changed, and it’s safely to browse adult sites without fear of breaking your computer, but one site called Horny Chat is taking things further. Let’s take a look at what they’re doing.

End-to-end encrypted messages

Horny Chat is a site that provides video chat online where anyone can message each other for free. Since the site is entirely anonymous, you won’t even have to leave your username and your messages are end-to-end encrypted. Since most people are scared of malware, that’s a pretty safe thing to offer.

Since the messages are completely anonymous, Horny Chat can’t really tell whether your messages should be trusted. This way Horny Chat is offering a safe place for people to chat, regardless of if you’re a man or a woman.

Extensive privacy options

Besides being very secure, Horny Chat allows you a lot of advanced features as a user. For one, you control what categories you’re willing to receive messages from and can hide them from even seeing (and possibly not even sending to you). Another thing that Horny Chat allows is that you can easily make your messages hidden from friends. You can make them hidden to everyone, just you, or people who have given their permission first.

Another feature of Horny Chat’s privacy options is that you can hide your chat histories from being seen by others. For instance, if you and someone are chatting to each other and you come across a message that you want to keep secret, you can just select “hide”. This will then completely hide the chat from everyone, but if your friend should choose to view the history, they can. Another option is that there’s also the ability to delete your chats from history entirely.

Beyond the privacy features, there are also the “block” and “report” features. These may not be as helpful as some of the privacy options, but they can be handy if someone is causing a problem. Say, for instance, you were chatting to one someone and then she started messaging multiple people, that one person could block her while everyone else can still see the chat. If someone is spamming chat rooms and sending a lot of links to a chat, you could “block” that person immediately. Again, if that person is friends with you, they can see what that person was doing.

Even though these privacy options aren’t as helpful as some of the other options, they do a decent job protecting you from a lot of problems. Even with just these simple privacy options, Horny Chat makes using it a much safer experience.

More secure encryption

Since Horny Chat is end-to-end encrypted, that means your messages aren’t being monitored by their server, but are instead being encrypted as they’re sent from your device to their server and then as they’re sent back to your device. That is what makes these options so secure.

Another thing about the encryption is that Horny Chat allows you to download a copy of their entire database to your computer and then you can use an encryption program to encrypt your chats. If that database gets infected, your chats will be protected from that. Other end-to-end encrypted sites like this don’t allow you to do that.

Even though you could download the database to your computer, it’s still much safer not to do that, since in the event that the FBI or someone else gets their hands on it, then at least you’re protected from that. This encryption also won’t store your contacts lists or your photos like some sites do (some of which also store your credentials, but that’s not what end-to-end encryption is about. Instead, it is about keeping your messages completely and utterly private). You can see how this can be used to increase the security on other sites in the future.

When using Horny Chat, your chat is also encrypted with the following program:

OpenSSL (https://www.openssl.org/).

Since this encryption is more secure, you don’t need to worry about anyone being able to read your chats. Even if Horny Chat is hacked, it can’t read your chat messages.

Conclusion

These end-to-end encrypted chats that Horny Chat provides are quite a good place for chatting. Although many sites provide similar options, there isn’t one option that’s so secure on so many ends. This means that there’s no other site like this out there right now.

It’s not the only site to offer encrypted conversations, of course. But it’s certainly a safe option to have if you’re on this type of site, or to check out the features to decide if they’re something you want.

Sex Chat is an adult platform that allows people to interact to talk about sexual and intimate fantasies. It is a fun place to let your creative juices flow and discuss your kinks and fetishes. You can flirt with other members, find new friends, share stories and other fantasies about sexual things that would turn you on.

How HTTPS Encryption Works To Keep You Safe On Adult Dating Sites

What Is HTTPS?

HTTPS is your standard HTTP protocol with a generous layer of delicious SSL encryption. When something goes wrong, it prevents people from modifying requests and snooping up your browsing. It also keeps your passwords, communications and credit card information secure by connecting your computer to the server to which you want to send data.

HTTP is a request response protocol for communication between a client and a server. Hypertext Transfer Protocol Secure (HTTPS) is a more secure version of the HTTP protocol that sends data between your browser and the website to which you are connected. It is used to protect confidential online transactions such as online banking, online shopping and order forms.  

How Does HTTPS Encryption Work?

A crucial step in a secure HTTPS connection is to ensure that the web server is who it claims. An SSL certificate is an important part of the setup because it ensures that the owner of the web server is who the server claims to be. It works much like a driver’s license by confirming the owner’s identity.  

After receiving confirmation from the server, the client initiates the SSL-encrypted session. After checking the SSL certificate, the browser creates a unique symmetrical public key and sends it to the server. Once this step is completed, the certification body issues the certificate to the owner of the website.  

Once an SSL session is set up between server and client, both can exchange encrypted data. An attacker cannot read the data that crosses the wire, so you always know that you are talking to the server to which you think that you are actually talking. Client and server communicate via HTTPS, and HTTPS is a secure TLS wrapper.  

One key (public or private) is used to encrypt the data, and the other key is used to decrypt the data. The third key, the so-called session key, is encrypted on your computer with the public key you receive from the website server and shared with the server. The server decrypts this session key when it uses the secret private key.

It prevents hackers from reading or altering the data transferred between the browser and the web server. If a web page is a page, the browser acts as a client and a web server. The web server hosts the files (HTML, audio, video files) and returns them or responds to the client’s request. This is particularly important when browsing something sensitive like an swingers dating site, such as SLS Swingers.

Why Was HTTPS Created?

Security problems with HTTP can be solved by using a secure communication channel called HTTPS. HTTPS keeps your information confidential by using Transport Layer Security Protocol (TSL, also known as SSL) and Security Socket Layer. Netscape included a new protocol called Secure Socket Layer (Secured HTTPS), which is known and used by website operators as HTTP. 

SSL certificates provide an additional layer of security for sensitive data that should not be accessed by third-party attackers. This is particularly important when it comes to the operation of e-commerce websites. Secure third-party certificates encrypt the connection with a level of protection known as an SSL certificate when purchased.  

It is an important protocol for securing and authenticating data on the Internet. HTTP transfer data in hypertext format from the browser to the web server, while HTTPS transmits data in encrypted format. It prevents hackers from reading or altering the data transferred between the browser and the web server.

How Do I Use HTTPS On My Site?

To prepare a web server to accept an HTTPS connection, an administrator creates a public key certificate for the server. The certificate is signed by a trusted certification authority, and web browsers accept it without warning.

Popular web servers such as Apache, Nginx and IIS as well as web site controls such as CPanel and Plesk support HTTPS, so you don’t need to develop or install custom software for HTTPS communications. All you need to do is install an SSL certificate on your site and update the configuration of your site to use HTTPS. Once your website is created, you can easily switch from HTTP to HTTPS, even if you did not do so at the right time.  

If you are interested in a new or up-to-date website using HTTPS, we can support you throughout the purchase process of a certificate to ensure that incoming HTTPS links continue to work.   

If you need to back up your website, it is quick and easy to request and install an SSL certificate. Although the web community has adopted TLS terminology, you will still see certificates called SSL certificates for simplicity. This means that if you believe you are installing a so-called SSL certificate, you are more likely to use the most up-to-date and secure protocol. 

Public Key Cryptography & Ciphire Mail

Public Key Cryptography

The following document contains basic information on crypto – short for cryptography – and a general introduction to Ciphire Mail. Both are intended for non-technical users. Advanced users may wish to read Niels Ferguson and Russ Housley’s Technical Review of Ciphire Mail.

Introduction to Public-Key Cryptography

Ciphire Mail uses what is known as “public key cryptography” to secure email communications. Whitfield Diffie and Martin Hellman invented public-key cryptography in 1976. For this reason, it is sometimes called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key. The one key model is called symmetric encryption. But let’s get back to the two keys.

Ciphire Mail uses the public [two] key system. It has been thoroughly tested by the scientific and information security communities and has become an industry standard. As a Ciphire user, you own a key pair. Your private key is secret and is stored securely on your computer. Your public key, on the other hand, is made available to anyone who wants to communicate with you. It is accessible to all Ciphire users through a central directory – something like a very secure telephone book – managed by Ciphire Labs.

To guard your security, it is crucial that the central directory publishes only authentic and non-compromised public keys. Here’s the important bit. When someone wants to send you an encrypted message he uses your public key. You receive the jumbled message and decrypt it with your private key. Public key encrypts, private key decrypts. Simple. But what if you wanted to send a confidential message to someone and you were duped into using the wrong (or fake) public key? Your deceiver could then decrypt your encrypted message using his private key, read it, possibly change it, pass it along, and you would be none the wiser. This is why valid public keys are absolutely essential to secure communications.

Accordingly, your public key will go through a number of checks and verifications at Ciphire before being recognized as valid and published on the directory. This is why we use the term “certificate” to refer to the document containing your verified public key in the Ciphire Certificate Directory. So when your friend – who is also a Ciphire user – writes an encrypted email to you, her Ciphire Mail client will use your public key (available in the Ciphire Certificate Directory) to encrypt her message to you. When you receive the message, your Ciphire Mail client decrypts it with your private key. This all happens seamlessly in the background. Ciphire Mail does all the heavy lifting for you.

Note that anybody using Ciphire Mail can write an encrypted email to you, because all system users have access to your public key. But you are the only person able to read these emails because you are the only person who has the matching private key needed to decrypt them. So you can be certain that the email was exchanged in full privacy without anybody reading it along the way. When your correspondent digitally signs his message to you, his Ciphire Mail client uses his own private key to authenticate the email. When you receive the email, your Ciphire Mail client gets your correspondent’s certificate, containing his public key from the Ciphire Certificate Directory, and verifies his digital signature. Again, Ciphire Mail does all of this automatically without interrupting your normal email routines.

Since the person corresponding with you is the only person who has access to his private key, he is the only one who can digitally sign his email. Therefore, you can be sure of the identity of the sender as well as of the integrity of the message.

Please Note

In the rest of the document, it will be assumed that you will run your Ciphire Mail client with the default settings.
Installation

Private users and non-profit organizations can download Ciphire Mail from www.ciphire.com free of charge. Simply choose the version corresponding to your operating system (Windows, Linux or Mac) and download the program.

Next, run the installer and follow the instructions. When the installation is completed (you will be notified), you need to restart your computer (Windows) or to relogin to your session (Linux and Mac OS X).

Doing this will start Ciphire Mail automatically. The next step is to initialize your software, which is also straightforward.
Initialization

Make sure you are connected to the Internet to initialize Ciphire Mail.

You just need to type your email address that you want to secure, and choose a short passphrase. Make it memorable, because you’ll have to remember and enter this passphrase every time Ciphire Mail is started (typically, when you start your computer). The software then creates your keys and stores them encrypted on your computer. One last thing. Don’t write your passphrase down on a post-it note and stick in on your monitor or some other obvious place. You wouldn’t leave your house key with a big sign pointing to it on your front porch. This is pretty much the same thing.

Your Ciphire Mail client automatically starts the certification process. You won’t need to perform any manual action. The certification process is a series of verifications and identification exchanges between your Ciphire Mail client and the remote Ciphire Infrastructure. During this process, you will receive an email notifying you that your request is being processed. When all security checks have been successfully completed, your certificate is then declared valid. It is stored and shared in the central Ciphire Certificate Directory and it is ready for use. A second email will notify you of this.

Ciphire Mail has now secured your email address. You can send and receive encrypted and digitally signed emails. Cool, huh?

How your Ciphire Mail Client Works

Before installing Ciphire Mail on your computer, your email client (Outlook, Eudora, etc.) would directly connect to your email server (at your company, your private email provider, etc.) to send and receive emails.

Now, your Ciphire Mail program resides on your computer – between your mail client and your email server – to intercept all the email-related connections. This way, your Ciphire Mail client can manage all your incoming and outgoing messages: it encrypts, decrypts, signs, and verifies signatures as needed. You now have your very own email security servant.

However, nothing changes for you as an email user. All these cryptographic actions are performed transparently, meaning that you do not need to change your mailing routines. You can send and receive emails exactly as you did before, only now they will be secured.

Sending an Email

How you do it

You write an email as you normally would from the address you have secured with Ciphire. You do not need to learn any new steps or secret handshakes since your Ciphire Mail client handles all cryptographic actions automatically.
What happens in the background?

Instead of traveling to your mail server the message is redirected to your Ciphire Mail client. From that point, if the person you’re sending a message to is also using Ciphire Mail, the message will be encrypted and signed. If they are not on the system they will receive an unencrypted message with your digital signature to at least ensure the authenticity of the communication. Whatever the case, the email is then handed over to your mail server and sent normally.

Signing an email

By default, all your outgoing emails are digitally signed. To digitally sign your email the program uses your private key which in turn authenticates your original message. Digitally signing your email allows the recipient(s) to make sure that you were actually the sender of the email, and that the email is received in its original, non-tampered form.

Encrypting an email

The program examines the email addresses of the recipient(s) of your message. For each recipient, the program sends a request to the central Ciphire Certificate Directory for a valid certificate belonging to the recipient. At this point, there can be two answers from the Ciphire Certificate Directory:

No: the recipient does not have a valid Ciphire certificate in the central directory. In this case, the message is sent unencrypted to this recipient.

Yes: the recipient has a valid active certificate. In this case, your Ciphire Mail client retrieves and verifies it. The program then uses the certified public key of the recipient to encrypt the email to this recipient.

Receiving an Email

How you do it

Just as with sending emails, receiving emails with Ciphire Mail does not require any change in your mailing routines.
What happens in the background?

Instead of traveling directly from your mail server to your mail client, incoming messages are redirected to your Ciphire Mail client. The program decrypts incoming messages and verifies their signatures when needed. The processed emails are then displayed in your inbox normally.

Decrypting an email

When you receive an encrypted mail, your Ciphire Mail client detects it automatically. It uses the locally stored private key corresponding to your email address to decrypt the message. Once the decryption is done, Ciphire Mail checks whether the message carries a digital signature to verify.

When you receive an email that is not encrypted, Ciphire Mail directly looks for a digital signature to verify.

Verifying a digital signature

Senders need to have a valid Ciphire certificate in order to sign their messages. When your Ciphire Mail detects a digital signature, it retrieves the certificate of the sender from the central Ciphire Certificate Directory. With the public key contained in the certificate, Ciphire Mail can verify the signature, hence the identity of the sender and the authenticity of the message.

If no digital signature is detected, the email is directly handed to your email client.

Reports and Mail Tags

Security Reports

To inform you on the level of security of each email, your Ciphire Mail client automatically adds tags to your emails. By default, these tags are placed at the end of the subject line of each email. Possible tags are:

  • [u]: the message was neither encrypted nor signed,
  • [encrypted]: the message was encrypted but not signed,
  • [signed]: the message was signed but not encrypted,
  • [ciphired]: the message was encrypted and signed

Capability Reports

You can see who has or does not have a Ciphire-enabled email address among the people with whom you communicate via email. Their name – in the sender’s field for example – will be followed by the tag [c] if they are active Ciphire users. If they are not, nothing will appear behind their name.
Notes

Your Ciphire Mail software offers a large variety of options and specific settings, accessible through the Ciphire Options window. For example, you can add more email addresses to secure; you can set particular encryption or signing preferences; you can choose to get more – or less – security reports, etc.

Whenever there is any action with a certificate, the fingerprint system verifies that the certificate is valid and has not been tampered with. In addition, it performs a chain check of previous certificates.