![]() ![]() OPH can use a wide range of in-build voice codec (C source is included) from ultra low-bitrates up to high quality. OPH provides Perfect Forward Secrecy (uses a fresh key for each call) and Full Deniability for using long-term public keys of participants (as a fact and a content of the conversation): like a deniable SKEME protocol uses for initial key exchange. using long-term public keys signed with PGP.using previously shared password (with the possibility of hidden notification of enforcement).Otherwise possible mways of ulti-factor authentication are: Also the recipient can verify identity of the originator ’s onion address (only with the permission of the sender) similarly to the TorChat authentication. In the case of a call to the onion address Tor protects against MitM attacks. OPH provides independent level of p2p encryption and authentication which employs modern cryptographic primitives: Diffe-Hellmann key exchange on Elliptic Curve 25519 and Keccak Sponge Duplexing encryption. OPH uses a custom protocol (not RTP) with only one byte unencrypted header that can provide some obfuscation against a DPI. And also OnionPhone can establish a direct UDP or TCP connection to the specified port on IP-address or host. The recipient can install a reverse onion connection to the originator ’s HS and use a faster channel periodically resetting the slower channel to reduce overall latency.Īlso provided is the ability to switch to a direct UDP connection (with NAT traversal) after the connection is established over Tor (Tor network opposed to a SIP server requiring registration and collecting metadata). Call is targeted to the onion address of the recipient (its hidden service HS). OnionPhone (OPH) is a VOIP tool for calling over Tor network which can be used as a VOIP plugin for TorChat. Torchat is largely the work of privacy specialist Bernd Kreuss, who explains the program, the set-up and the few annoying drawbacks very well in one web page at /p/torchat.VOIP tool for calling over Tor v0.2a (not compatible with IKE in v0.1a, see docs) But if you want to have confidential talks about confidential matters with friends and colleagues, Torchat will pretty much ensure that no unwanted petty bureaucrats will break in. The names are secret, the end-to-end conversation is encrypted.Īs always, note that this kind of software might not suit a seriously criminal person who has attracted the world's very top intelligence agencies. ![]() There are few other serious differences between Torchat and other text-chatting software. Only you and those you want to Torchat with will know the identity of that number. You will not choose a user name, but be assigned one, and it will be quite geekish, as in "h7odh45jzqw8iU7". And they need an internet connection, of course.ĭweebs can get all the information they want on how it works, but the point is that Torchat can be set up fairly easily - accent on "fairly" - and people can be talking free of fear of monitoring in a short time. I won't show you my Torchat, but the provided screenshot by the author illustrates the similarity with better known products.īoth (or many) people chatting have to have Torchat installed on their Windows, Mac or Linux computers. It is essentially like Microsoft or Yahoo chat software, except that it is set up for secrecy in a way that anyone trying to monitor the conversation cannot tell who is chatting, who is on the other end, or - perhaps most importantly - what is being discussed. Torchat allows texting and chatting on the internet in the way that Tor-equipped browsers allow users to go to places that are not officially government approved. Tor (it stands for The Onion Routing, not an important factlet) is often built into browser software distributed in countries where the government picks the "good" parts of the internet. ![]() Torchat is a spin-off of the well known Tor project. Now the best and best known system for going behind the backs of concerned authorities is being used for another purpose. This screenshot shows Torchat in a conversation, along with the familiar list of friends and status. ![]()
0 Comments
Leave a Reply. |