• No results found

Simply download Beepip from and run the file when it arrives at your computer.

N/A
N/A
Protected

Academic year: 2021

Share "Simply download Beepip from and run the file when it arrives at your computer."

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

How To's:

How do I install Beepip?

Simply download Beepip from http://beepip.com and run the file when it arrives at your computer.

How do I set up Beepip?

Once you've opened up Beepip, you need to create an identity. Do this by going to the "My Identities" tab and clicking "new". Create as many identities as you like.

How do I send my first message?

Go to the "send" tab and enter the Beepip address of the user you want to send your message to. Choose one of your identities as the "from" address. Type your message in the message field and click "send". It will take a few minutes to scramble and send your message so don't shut down Beepip during that time.

How do I use Tor as a proxy?

Navigate to Settings > Network Settings and select SOCKS5 from the Type: drop down under the Proxy server / Tor section.

• Next to 'Server hostname:' enter 'localhost' and next to 'Port:' enter '9050'. • Select OK.

• Restart Beepip.

Note: if you are using the Tor Browser Bundle, skip this section and follow the instructions under: "How do I set up Beepip to work with Tor browser Bundle".

How do I setup Beepip to work with Tor Browser Bundle?

Navigate to Settings > Network Settings and select SOCKS5 from the Type: drop down under the Proxy server / Tor section.

• Next to 'Server hostname:' enter 'localhost' and next to 'Port:' enter '9150'. • Select OK.

(3)

Frequently Asked Questions:

Can I send spam?

No. The beepip system is designed to stop spam. The proof-of-work required to scramble and send messages makes spamming uneconomical. In addition, beepip addresses are designed to be thrown away and changed frequently. They are also unable to be found or guessed, so there is very little chance that you will ever get any type of unsolicited message.

Is Beepip completely secure?

There will not be any way for someone without access to your computer to read your beepips. An interested party will only gain access to your beepips if they gain access to your computer.

How is Beepip different to email?

Email relies on central servers to store and process messages. This means you have to trust that other people won't snoop on your messages. Governments are now able to gain access to ALL email - even encrypted email. Beepip does not rely on central servers so you don't have to trust third parties like email

providers or root certificate authorities.

Is Beepip fully distributed?

Yes.

Does Beepip acknowledge delivery?

Yes.

Is it okay to create lots of Beepip identities/addresses?

Yes! We want you to throw away and change your beepip addresses/identities frequently. Create and destroy as many identities/addresses as you like - they are completely disposable.

What is the maximum size of file attachments?

(4)

Formatting - Which HTML tags can I use?

Tag Description

a Anchor or link address Address

b Bold

big Larger font

blockquote Indented paragraph body Document body br Line break

center Centered paragraph cite Inline citation

code Code

dd Definition data dfn Definition

div Document division dl Definition list dt Definition term em Emphasized

font Font size, family, and/or color h1 Level 1 heading h2 Level 2 heading h3 Level 3 heading h4 Level 4 heading h5 Level 5 heading h6 Level 6 heading head Document header hr Horizontal line html HTML document i Italic img Image kbd User-entered text meta Meta-information li List item

nobr Non-breakable text ol Ordered list

p Paragraph

pre Preformated text qt Qt rich-text document s Strikethrough

(5)

Tag Description

small Small font

span Grouped elements strong Strong

style Style sheet sub Subscript sup Superscript table Table

tbody Table body td Table data cell tfoot Table footer th Table header cell thead Table header title Document title tr Table row tt Typewrite font u Underlined ul Unordered list var Variable

Formatting - What CSS Properties Can I use?

Property Values

background-color <color> background-image <uri> color <color>

font-family <family name>

font-size [ small | medium | large | x-large | xx-large ] | <size>pt | <size>px

font-style [ normal | italic | oblique ]

font-weight [ normal | bold | 100 | 200 | 300 | 400 | 500 | 600 | 700 | 800 | 900 ]

text-decoration none | [ underline || overline || line-through ]

font [ [ style'> || weight'> ]? size'> <'font-family'> ]

text-indent <length>px

white-space normal | pre | nowrap | pre-wrap margin-top <length>px

margin-bottom <length>px margin-left <length>px

(6)

Property Values margin-right <length>px padding-top <length>px padding-bottom <length>px padding-left <length>px padding-right <length>px padding <length>px

vertical-align baseline | sub | super | middle | top | bottom border-color <color>

border-style none | dotted | dashed | dot-dash | dot-dot-dash | solid | double | groove | ridge | inset | outset

background [ <'background-color'> || <'background-image'> ] page-break-before [ auto | always ]

page-break-after [ auto | always ] float [ left | right | none ] text-transform [ uppercase | lowercase ] font-variant small-caps

word-spacing <width>px

What are subscriptions?

Subscriptions allow you to receive beepips that were broadcast by addresses you subscribe to. When someone broadcasts a beepip, it is sent out to everyone who is subscribed to the address. Since broadcast messages are meant for widespread use, rather than secrecy, everyone who is subscribed to the address is able to decode the message.

Is there a mobile version of Beepip?

Not yet, but we hope to have one in the future.

Is there Mac or Linux versions of Beepip?

Not yet, but we are working on them and they should be ready soon.

My connection indicator is red. What does this mean and how can I fix it?

A red connection light indicates that you are having connection difficulties. Check that you can access the internet and check that you firewall isn't blocking Beepip. Some firewalls have restrictions on outgoing connections, so make sure

(7)

that you allow unrestricted access for Beepip. Also check that your anti-virus software or other security software isn't blocking Beepip.

Sometimes Beepip takes a long time to connect to the network, especially when your version of Beepip has a large list of IP addresses and ports which run

Beepip. Please allow up to 30 minutes for Beepip to connect. If Beepip is still not connected after this time, try deleting your "knownnodes.dat" file (this file is stored in the same folder as your "keys.dat" file and your "messages.dat" file).

How many connections should I have?

You only need 1 connection for Beepip to work. As long as your connection indicator is green, you have a connection.

How do you copy an address. Is there an easy way of doing this?

References

Related documents

UPnP Control Point (DLNA) Device Discovery HTTP Server (DLNA, Chormecast, AirPlay Photo/Video) RTSP Server (AirPlay Audio) Streaming Server.. Figure 11: Simplified

l Meter Total VA-h current value Integer SHARK200IECMeas/eneMMTR1$ST$TotVAh$q (Good) 0000000000000 Bit stream quality.. SHARK200IECMeas/eneMMTR1$ST$TotVAh$t Meter Time Stamp UTC time

Consistent with the descriptive results of Table 2 we find that even after controlling for industry and firm- specific characteristics, the location characteristics

• But as long as the applied force does not increase, the value of static friction itself will stay the same • Static friction is always equivalent to applied force as long as

Virginia residents attending a private college in the state will also receive the undergraduate Tuition Assistance Grant (TAG) award. Despite enrolling the neediest and

this passage, Mary conceived and bore more than the human side of Jesus; she bore the creator of the world. Her image is that of the divine mother, the female who is part of

Two copies of the scores of the performed pieces must be given to the jury at the beginning of the audition (optional for participants in the “Germano Varesi” Pop Singer

Quality and performance measurement, reporting, and ongoing clinical care and process improvements require the foundation of an interoperable health information system including