
Transfer complete.Įnter receive wormhole code: 7-crossover-clockwork On the other computer, please run: wormhole receiveġ00%|=| 7.92K/7.92K Ĭonfirmation received. Replace README.md with the name of any file in the home directory. The following example shows the output related to sending the file "README.md" with Magic-Wormhole. In the future, it is planned to use ephemeral onion services (OnionShare style) to eliminate reliance on a rendezvous server susceptible to DoS attacks. Wormhole codes are single-use and do not need to be memorized. The receiving side offers tab-completion on the code words, so usually only a few characters must be typed. The codes are short and human-pronounceable, using a phonetically-distinct word list. The wormhole tool uses PAKE “Password-Authenticated Key Exchange”, a family of cryptographic algorithms that uses a short low-entropy password to establish a strong high-entropy shared key.

This is by far the simplest way to send files securely between two endpoints that the Whonix ™ developers have encountered. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine. provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another.
