8000 GitHub - piling/state-of-secure-messaging
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

piling/state-of-secure-messaging

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

State of Secure Messaging

This document is intended to be a high-level summary of the various features / characteristics of current open source secure messaging systems. This document only covers completely open source end-to-end encrypted systems.

In essence, for all of these systems, all content of messages is encrypted on the sender and receiver's devices.

Under Development

This is a very rough draft of this information and there is still lots of work left to be done.

Feature Signal Tox Ricochet Pond Twister DMs
Architecture Central P2P P2P ? P2P
Hidden Metadata Some ? Some
Censorship Resistant ? ?
Contact Discovery Mobile Number ? ? ?
Offline Messaging ?
Group Messaging ?
Multi-Device Support (3) In Development ?
Calling ?
Video Chat ?
Deniability ? ? ?
Forward Secrecy ? ? ?
Future Secrecy ? ? ? ?

Metadata Leakage

Information (that is not part of the content of a message) that may be undesirable for others to know about.

Again this is just a very quick list of things I could think of that could be considered metadata. Suggestions welcome.

Key:

  • - leak does not matter / makes no sense.
  • the data is leaked.
  • the data is not leaked.
  • ? needs clarification / investigation.
Data Observer Tox Ricochet Pond Twister DMs
Usage Edge ?
Usage Public ?
Usage Contact - - - -
Contacts Edge ? ?
Contacts Public ? ?
Contacts Contact ? ?
IP Address Edge - - - -
IP Address Public ? ?
IP Address Contact ? ?
Currently Communicating Parties Edge ? ?
Recipients of Outgoing Traffic Edge ?

Data Definitions:

  • Usage: The observer can see when you are using the given system, or even just the fact that you do use it, or have used it in the past.

  • Contacts: The observer can see one or more associations (either IP Address or Identifier on System) between you and someone else.

    If for example an edge observer could observe a connection between you and another user of the same system (e.g. a direct TCP connection between 2 IP Addresses) then this counts as a leak of this kind. Over time an adversary could build up a map of all of your "contacts" presuming you message each of your contacts at least once since observation begins.

  • IP Address: Self Explanatory. Can be tied to a geographic location and your identity in many situations.

Observer Definitions:

  • Edge: Nearby network infrastructure, so your local network, ISP, NSA and any network you may connect to as a guest or otherwise all count as entities that can observe edge traffic, in essence anyone between you and the "system".

    Has Information:

    • IP Address
    • Physical Location
    • Real Identity
  • Public: Any person on the internet / whether using the system or not.

    Has Information:

    • Identifier on system (e.g. username / pubkey)
  • Contact: Someone on your contact's list.

    Has Information:

    • Identifier on system (e.g. username / pubkey)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0