Tor at the Heart: Onion Messaging

by asn | December 11, 2016

During the month of December, we're highlighting other organizations and projects that rely on Tor, build on Tor, or are accomplishing their missions better because Tor exists. Check out our blog each day to learn about our fellow travelers. And please support the Tor Project! We're at the heart of Internet freedom.
Donate today!

The Internet was made for humans to communicate with each other! Even though Internet calls over video and audio are totally possible nowadays, people still enjoy sending texts to each other due to their asynchronous, permanent and casual nature. To understand how important these instant messaging systems are, just check the user growth of systems like WeChat, WhatsApp, etc.



Unfortunately, all these major mainstream messaging systems belong to huge companies whose money comes from advertising and selling the data and metadata of their users.

The good news here is that in the past couple of years, there has been great progress in protecting users' data by employing end-to-end encryption using the Signal protocol. The bad news is that there has still been absolutely no progress in protecting the metadata and location information of users by these mainstream platforms.

Case in point, since most instant messaging systems are not anonymous, they get to learn the full location history of their users through the users' IP address history. Also, all major chat systems require a social media account or a phone number, which is simply impossible for some people, and it also makes it hard to create anonymous or burner accounts for everyone. It also makes you searchable and targettable by people who happen to know your phone number.

In this blog post, we showcase a few open-source text messaging tools that provide location privacy and additional security to their users by using Tor as a default. All of them are free and open source, so feel free to experiment!

Ricochet

Ricochet is an anonymous instant messaging tool that hides metadata by using Tor. It's got a slick UI and works on Windows, Linux and Mac OS X.

In the Ricochet protocol, each user is a Tor onion service. By utilizing onion services, the protocol achieves strong anonymity for its users. And because of its decentralized nature, it's impossible for attackers to censor it by taking down a single server.

Ricochet is designed with UX in mind, so it's easily usable even by people who don't understand how Tor works.



Chatsecure

If you happen to only use mobile platforms (like most of the world these days), Chatsecure is an app that you should check out! It works for both Android and iOS, and it allows you to connect to XMPP servers to communicate over encrypted OTR chat. This means that you can also use it to connect to other XMPP-enabled messaging systems like Facebook chat and Google Talk.

It's developed by the Guardian Project, and it's a part of their software suite for private communications that includes Orbot and Orfox. Stay tuned on our blog for more information about this software family later this December!



And now for further excitement, let's get into the more experimental sections of the secure messaging space!

Pond

Pond is an anonymous instant messaging tool with various sophisticated security properties that is capable of hiding even the metadata of its users.

The protocol is designed in such a way that even a nasty attacker who is constantly monitoring your Internet connection will have a very hard time figuring out when you actually send and receive Pond messages, even if she conducts statistical analysis of your traffic patterns. Smoke and mirrors you might say, but if you like protocols, we invite you to check out the Pond protocol specs.

Unfortunately, Pond is a side-project, and due to lack of free time, the project is not currently actively being developed, even though there is still a community of users. It only works on Linux, and it has a GUI interface.



Briar

Briar is an experimental P2P messaging system that is currently in private beta. It targets mobile users and is closely integrated with Tor onion services.

The Briar protocol is fully decentralized, and all communication is end-to-end encrypted. It aims to be highly resilient against network failures, and so it can also function over Bluetooth or WiFi. Furthermore, it attempts to hide the social graph of its users by keeping the user contact list on the client side.



Future directions

As you can see, there have been multiple efforts for private and metadata-hiding communication over the past years. Some of these projects are supposed to be used on top of already existing chat frameworks, whereas others aim to create their own ecosystems.

Of course, the research realm of secure messaging is far from complete; it's just getting started. From improving the UX to adding new security properties, this field needs further thinking all around.

For example, secure multiparty messaging is a very important upcoming field that studies how the protocols above that are designed for 1-to-1 communication can scale to hundreds of clients talking at the same time while maintaining their security properties.

Furthermore, as global surveillance is growing, we better understand the importance of hiding metadata from network attackers. Only now are we starting to grasp the importance of security properties like obfuscating communication patterns, hiding the users' social graph and letting users choose when to reveal their online presence.

Tor is extremely interested in the instant messaging space, and we are always on the lookout for innovative developments and interesting messaging projects. We have deep gratitude to all of the people who have helped to push the field of secure messaging forward, and we hope to enable them in the future to provide anonymous communication tools!

Donate and we will make it happen! :)

Comments

Please note that the comment area below has been archived.

December 12, 2016

Permalink

how do we help make end-to-end encrypted group msg happen ?

December 12, 2016

Permalink

Don't forget Conversations. One of the best XMPP clients at the moment. It implements all the important mobile extensions, it has Signal crypto with the OMEMO protocol, thus beating OTR, and it has Tor support (orbot required as additional app) built in. Especially OMEMO, Carbons and MAM allow a smooth, but still encrypted experience with multiple devices.

I definitely think that Conversations.IM is worth mentioning! OMEMO+XMPP encryption will change the world of encrypted communications! ChatSecure believes in Conversation's OMEMO encryption so much that they are going to include it in their upcoming 4.0 iOS release. I connect to riseup's XMPP onion service address with Converstations and it is beautiful.

Wikipedia says its license is GPL, and version 1.15.0 is available in F-Droid on my device. Not sure why people keep saying it is payware. Please enlighten.

December 12, 2016

Permalink

Sorry, your statement is incorrect...

"This means that you can also use [ChatSecure] to connect to other XMPP-enabled messaging systems like Facebook chat and Google Talk."

Facebook has not permitted the use of chat clients - including ChatSecure - since 2015.

Chat API (Deprecated)
https://developers.facebook.com/docs/chat

December 12, 2016

Permalink

Thanks to all for the wonderful "Tor at Heart" series!

Already donated but plan to give more.

Some of us will need more help to use secure messaging. One of the critical missing pieces: anonymous accounts to use when communicating with journalists (e.g. Calyx, Riseup) and persuading more journalists to make themselves available using proper authentication in Calyx chat rooms (for example).

There is an on-going story possibly involving FBI malware attacks and/or NSL attacks at Riseup, which is troubling. Last word was that Riseup is seeking advice from its lawyer, and it seems that their warrant canary has vanished. I have some concern that sysadmins may be operating under duress (from USG because Riseup servers are in the USA), because as a story at The Intercept noted, their responses to internal and external queries have been strangely worded.

In the past, a critical source of Tor Project funding has been BBG, the USG funded "soft propaganda" arm which funds Radio Free Asia and other news organizations which attempt to counter certain lines in the state-run press in countries such as CN, RU, sometimes with genuine news, sometimes (some say) with slanted news, so pretty much like CN state-run news counterparts aimed at US businesspersons.

Many Tor users (and, it is said, some employees) have long urged Tor Project to seek to diversify funding to enable the Project to tell USG to take a hike if it threatens to defund Tor Project if the Project does not put in a backdoor or do other and possibly even more inimical things USIC (or the US military or other arms of USG) demands. I applaud Shari's efforts to diversify Tor funding to try to lessen the danger of such unwelcome developments.

Now both Salon and Politico are reporting that Congress (probably without realizing it) passed a law (as part of the NDAA) which guts the Board of Governors of BBG, placing BBG under control of a single Presidential appointee. This has raised fears that the new US administration will turn BBG into a full-on state-run propaganda arm offering outright fake news for foreign and domestic consumption (BBG is said to starting up English language TV stations in the US homeland, aimed at US persons). This raises the question of whether the new administration could attempt to turn Tor Project itself into a Trump propaganda arm.

December 12, 2016

Permalink

P.S. My previous submission isn't intended for publication. It's just a heads-up.

Thanks to the TorProject for everything it does. For years, the Tor browser has been the only browser I use for everyday web surfing. (Just not with my primary email or my bank, which are not Tor-friendly.)

Regarding: "P.S. My previous submission isn't intended for publication. It's just a heads-up."

I don't know what that means or to what comment it refers, but it does not refer to the comment which appears just above, the one (which I wrote) which begins:

> Thanks to all for the wonderful "Tor at Heart" series!
>
> Already donated but plan to give more.

December 12, 2016

Permalink

Hello, THIS IS NOT A COMMENT BUT A QUESTION - I cannot find the answer in your FAQ's. Today THOR was very accidently and not at all intended installed on my Win 10 system with Firefox browser. My first thougt was: 'this is malware' and I removed, with some difficulties the TOR-program. Afterwards I noticed that ALL MY ;DOC & ;JPEG FILES were RENAMED in a numerous code (in stead of a common name) and that they all got the extension .osiris. I think you EASILY CAN UNDERSTAND THIS IS NOT funny for me.

So, it would be a real joy to me if I can read your SOLUTION AND HOW TOT GET MY FILES BACK WITH THEIR NORMAL names and extensions on my computer.
What do I have to do to RECTIFY THIS VERY ANNOYING situation; there is no one of my documents I can use; I have no acess to them!!!!

Hoping to hear from you very soon! rita.decaluwe@hotmail.com

December 13, 2016

In reply to arma

Permalink

Hi Roger, I remember in 'State of the Onion', you said that many people are first hearing about Tor when the get infected with ransomware, and they falsely assume that the Tor Project is somehow associated with the attackers, making it hard to defend the idea of Hidden Services. I think that was in late 2014 or early 2015; it's really sad to see that's still going on today.

Plus one.

I'd add that unfortunately we must also consider the possibility that at least some irate complaints about alleged infections with ransomware might actually be false reports made as part of some state-sponsored (or not) "effects campaign" targeting the Tor network.

Every citizen in every nation must recognize that at the dawn of the 21st century, we are all targets of the most sophisticated and ambitious intelligence services which have ever existed, and that the spooks frequently attempt psyops as well as more technical attacks.

Needless to add, we cannot let this unfortunate situation deter us from using Tor, engaging in activism, or from expressing our views, however objectionable our own (or other) governments may find these views.

December 13, 2016

Permalink

I'm missing TorMessenger in the list of messaging apps and I can recommend CoyIM for anonymous Jabber with Tor.

Be careful with feature-rich Jabber clients like conversation. In my experience most Jabber clients which support Jingle file transfer or voice and audio chats have privacy leaks ans should not be used with Tor if anonymity is important (e.g. Gajim or Pidgin for linux desktop pc)

I think Conversations is Tor-aware (integrated with Orbot, but I might be thinking of another chat app) so one would think it would handle Jingle properly (or at least block it). Also, there's always Orwall, which can block non-Tor traffic and prevent an app from learning the device's public IP in the first place.

December 13, 2016

Permalink

Conversations is payware, you need to buy it; Chatsecure for android is discontinued: "We are not actively developing this app anymore, but will continue to fix any critical bugs" it already has problems on android 7; that leaves only Zom. So is Zom any good?

That's a bummer. I used Conversations when it was free, and ChatSecure when it was actively developed. Both were pretty nice. Are you sure Conversations is payware? Wikipedia says its license is GPL, which usually makes software free as in beer.

I guess Beem is the last Free (in both senses) Android XMPP client. I think it supports OTR but is nowhere close to supporting Jingle and is not Tor-aware (although you could connect to a .onion server with it).

It's a real shame that so many XMPP clients are being discontinued or were already underdeveloped, and new (non-interoperable) messaging apps are popping up all the time.

"Let's write an app that has a federated network architecture very similar to XMPP, except it won't be compatible with XMPP clients and won't federate with XMPP servers, just so we can segment the user base instead of writing an XEP to get our little algorithm into the standard everyone is already using. We'll call it 'Matrix'." Is what the logic appears to amount to.

Fuck, how hard is to understand that free doesn't mean gratis? It's totally fine to take money for a program that's free, rms actually took money for copies of Emacs, too.

Basically, the gpl asks you to not just sell a binary but also to hand the other person the source code (and allow him to modify the code and than to hand it to a third party). The code for conversations is on github and you are free to modify it and compile it and distributed (just look at the gpl) etc..

Just consider it as a kind of donation or fee for compling the source code, or to take the hassle to put it on google fucking store.

--> And you are not "buying" the program in google's store.

Thanks for this. I don't use Google Play and I didn't know Conversations had a fee on there, so that's why I was confused in my earlier post about the GPL. Also, I've never consciously noticed the GPL being used this way before, but I suppose you are correct and it is a legitimate use. So the payware binary on Google Play is compiled from the same free/open GPL source on github (it's not a "premium" or "plus" version in other words), as is the $0.00 binary in F-Droid.

PS: I don't think you really had to use the "F" word to explain the situation. Not that I'm being uptight about it -- I couldn't care less -- but just because you've (I sense) gone over this a hundred times before with other people doesn't mean that we here should automatically know it.

December 13, 2016

Permalink

i love ricochet but i am unable to use the new version :1.4 ( it does not run).

December 13, 2016

Permalink

We prefer Sig-int mail or Tor mail is much better that using by high profile user ^_^

The android/iOS/Window/macOSX still can per-install scanning software to scan the process ID / usage /port open at those secure communication software Ricochet / Chatsecure /Pond / Briar to tag as suspicious user in watchdog_2

December 14, 2016

Permalink

Do you really think it's a good idea to promote a program that either dormant or deprecated? If there are no (security) updates for Pond people shouldn't use it anymore -- just think about a Firefox fork that receives no updates, you wouldn't recommend that, would you?

Pond is a very interesting project and it's stealth is attractive to me , it still can be combined with other forms of encryption to keep it secure - thanks for including it

If your talking about ricochet for linux you probably have this common problem.

Here is the Fix. I had to do this.

info can be found here:
https://gcc.gnu.org/onlinedocs/libstdc++/faq.html#faq.how_to_set_paths

DO THIS:

I applied this update from a PPA:
https://forum.synology.com/enu/viewtopic.php?t=105573

sudo add-apt-repository ppa:ubuntu-toolchain-r/test
sudo apt-get update
sudo apt-get upgrade
sudo apt-get dist-upgrade

DONE

Now rico should run.

December 15, 2016

Permalink

This is such an awesome series of posts!

Did you see that Edward Snowden just requested self-destructing text messaging from Twitter's CEO?

twitter.com/Snowden
Edward Snowden
13 Dec 2016

> One more ask, @Jack: how about secret, burn-after-reading DMs? Even if E2E encryption won't work by default in all clients, give us a start!

Snowden is also asking for encrypted cameras for photojournalists.

December 19, 2016

Permalink

I will not be useing tor until 1 Feb 2017 as it has taken me 4 yrs just to understand how to safely use it If TOR where to teach this the useage starting at a level even to a layman Ide say it would be to your advantage .TOR you are second on my to Wikileaks pertaining to my efforts attempting to stop torture aginst us citizens in the US by the US federal govt (ref.bill green battles injustice or YouTube civil rs us torture jeffrey michael aliases Greg Bean , Bill green, john thompson google+