Bitcoin-Linked Bitchat Goes Open Source To Battle Censorship In Iran

0
2
Iranian Protestors Leverage Open Source Bitchat To Bypass Regime Blackouts While Closed-Source Noghteha Offers Localised Resilience
Iranian Protestors Leverage Open Source Bitchat To Bypass Regime Blackouts While Closed-Source Noghteha Offers Localised Resilience

Iranian demonstrators are using open source Bitchat and its localized fork Noghteha to communicate amid internet blackouts, balancing transparency with security against regime interference.

Intense protests against Iran’s Islamic Republic regime have prompted nationwide internet blackouts and the jamming of satellite services, including Starlink, as authorities attempt to disrupt coordination among demonstrators.
Protestors have turned to offline communication apps—Bitchat, Noghteha, and Delta Chat—leveraging mesh networks and cypherpunk principles to maintain connectivity without the internet.

Bitchat, developed by Bitcoin pioneer Jack Dorsey and open-source developer Calle, operates via Bluetooth mesh networks and the Nostr protocol. Released under the MIT license, it enables global replication, auditing, and adaptation in high-stakes environments.

Noghteha, a closed-source fork tailored for Iran, adds full Persian/Farsi support, an enhanced user interface, and context-specific features. Independently developed by digital-political activist Nariman Gharib, it was released just before the shutdown to maximise reach and prevent regime interference, while remaining compliant with Bitchat’s MIT license.

The apps have seen rapid adoption: Bitchat supported Nepalese protestors during previous social media restrictions, while Noghteha recorded over 70,000 downloads in three days via Google Play, with further distribution via Bluetooth and sideloading. Promotion by Iran International and guidance from opposition leader Reza Pahlavi amplified reach.

Experts warn of sophisticated regime tactics. Ziya Sadr, Bitcoin researcher and former political prisoner, says: “The regime sets up phishing attacks, creates fake download links, and uses influencers on social media to misguide people into installing malicious versions of the same app.”

While Calle cautions about closed-source security risks, the Iranian example illustrates how open-source principles empower individuals, offering transparency, adaptability, and resilience against censorship, even as closed-source adaptations provide targeted protection in hostile environments.

LEAVE A REPLY

Please enter your comment!
Please enter your name here