Secure means of communication in a network
We go to the very sad part of our story. Although almost every type of online communications has protected solutions for their application will have to convince your interlocutor that «as needed.» Experience suggests fans Jabber, do so without the interference of large companies is not possible. Therefore, this review shall be more futuristic in nature — if all this demand will probably anybody ever learn from this to make money.
To send secure messages developed cryptographic protocol OTR (Off-the-Record). To create a strong encryption protocol uses a combination of algorithms AES, a symmetric key, Diffie — Hellman, and the hash function SHA-1.
The main advantage over other OTR encryption — is its application on the fly, and not after the preparation and settings of the message. It was designed by Nikita Borisov, Ian Goldberg and. To use third-party applications developers create client protocol libu. Therefore, to protect the data on the IM-channels, you can use a specially designed to protect applications.
One of these projects — Cryptocat; is a web application with open source, written in JS. There are extensions for Chrome, Firefox and Safari. In addition, there is the client application, but only for OS X. Kriptokat encrypts messages on the client and passes them to a trusted server. To do this, on the client side using symmetric encryption of messages and files using AES-256 and the selected key. Each chat generated a new key.
Other participants in the conversation — up to ten people in the room — can read them only if properly introduce yourself the same key. For reliable transfer of keys used Diffie — Hellman to generate a unique fingerprint for authentication — the hash function Whirlpool, and to verify the integrity of messages — HMAC-WHIRLPOOL. The method works with the keys Cryptocat turns in a perfectly straight secrecy in which even the loss of the private key can not compromise the session key. Log correspondence is removed after 30 minutes of inactivity, and the service works with a constant SSL-encrypted.
Another project of this kind — Bitmessage, written by Jonathan Warren on a python. Bitmessage — a decentralized P2P-program to exchange encrypted messages between two and / or more users. It uses strong cryptography, which protects users from listening at your ISP or on the server. It is worth noting that the cryptographic system almost exactly copies the scheme, which is used in P2P-system Bitcoin, but is aimed at the exchange of messages. Bitmessage feature is the fact that the communication between two users is almost impossible to prove that a message is not transmitted directly from the user from
A to B, and distribution to all members of the network (such an approach realized in Tor). Thus it can read only the user to which the connection is established and which has a valid key for decryption.
The latest project of this series, which we consider to be TorChat. TorChat Network is a free decentralized vysokoanonimnuyu kriptozaschischennuyu instant messaging and file. All code is open and, therefore, check. TorChat basically uses the anonymous network Tor, but it is completely separate project. The anonymity of the data rests entirely hidden services Tor, TorChat, in fact, only a superstructure to them, engaged in processing messages. Crypto connect two users is also provided a Tor hidden service through asymmetric encryption standard RSA. Initially TorChat was written on a python client for OS X, respectively, in the Objective C. In early 2012, a project was launched jTorChat, developed in Java. As long as they do not implement all of the functionality of the original TorChar, for example, there is no file transfer.
most modern postal services, VFEmail supports opening the browser Microsoft Office documents. However, the secrecy of correspondence received to pay. However, there is a free, so-called «copper account», provides the user with 50 MB of server space for letters. To increase the space it is necessary to buy another, more perfect account.
Voice and video chat
With instant text messaging, we are anonymous, but what about the voice and video calling? Skype owns Microsoft, and it (the documents Snowden) has been convicted in the transmission of data security services.
Therefore, we need other options. One of them was the project Tox (tox.im) — open and free alternative to Skype. It uses similar to Skype P2P model of interaction in the network for the dissemination of messages that use cryptographic techniques to identify the user and the protection of transit traffic from interception. It supports text messaging, voice, video and file transfer. The work is organized through a simple and typical of IM-client GUI.
One of the key objectives of the project — to ensure the privacy and confidentiality of correspondence, including the protection against possible traffic analysis. In order to address the user uses a distributed hash table (DHT), which work is organized in the style of BitTorrent. The communication channel is organized with the help of the add-on with the implementation of the UDP protocol session layer (Lossless UDP).
To identify each user uses a special public key, which is also used as a public key for encryption. Separately generated private key to decrypt messages encrypted with the ID / public key. To organize communications connection is required for the feast (every network client is a feast), which can be defined manually or automatically found (search function is available peers on the local network).
Tox code is written in C and licensed under GPLv3. Supported platforms Linux, Windows and OS X. For organizations using encryption library libsodium. The functionality of the development is still at the level of a series of test prototypes console client written using the library ncurses, and graphical client based Qt5.
In addition, under GNU create an alternative called GNU Free Call. This project aims at the development and implementation around the world safe and self-organizing communication services. The base protocol GNU Free Call will use SIP, support is provided using VoIP-Server GNU SIP Witch. The communication network is built using P2P technology and has Toxs topology mesh-network in which each customer point of the Skype network client is connected through the neighboring point. The ultimate goal of the project is to create VoIP-network, reminiscent of Skype’s capabilities and ease of use.
On the technical side of the project in the GNU SIP Witch, in addition to routing SIP-calls, will be provided to support the work as a secure VoIP-proxy, added the ability to store the cache hosts and act as exchange routes with neighboring nodes mesh-network. Support for VoIP-proxy will facilitate the construction of user interfaces and creation of applications for mobile devices, as will support receiving and making calls from any SIP-compatible softphone.
Client software for the network GNU Free Call will support a wide variety of software platforms. The network will be fully decentralized structure is not tied to a specific managed server.
As you can see, hits in a panic because of the surveillance is not meaningful. There are all the usual solutions secure services: e-mail, instant messaging, voice / video chat, social networks. If you use them, no Big Brother (or modest intelligence agency) do not climb into your business. No one is able to stop the spread of information on the Internet!
Use all the features of the Network for their own purposes!