From 1bc3a98d8d25d33a1c2d258142b782ac8c332c9c Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 05:29:57 +0200 Subject: [PATCH 01/16] add session messenger image Signed-off-by: Stephen L. --- assets/img/svg/3rd-party/session.svg | 100 +++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) create mode 100644 assets/img/svg/3rd-party/session.svg diff --git a/assets/img/svg/3rd-party/session.svg b/assets/img/svg/3rd-party/session.svg new file mode 100644 index 0000000000..3cc36ec7c3 --- /dev/null +++ b/assets/img/svg/3rd-party/session.svg @@ -0,0 +1,100 @@ + + + +image/svg+xml \ No newline at end of file From ee915d912ec6f54809effa132805a66f06b318d6 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 05:37:08 +0200 Subject: [PATCH 02/16] add Session messenger + new sub-section for nodal messengers Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 43 +++++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index c0cc44d35b..f532dd5d22 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -180,3 +180,46 @@

Disadvantages

+ +
+

+ + Nodal +

+ +

Nodal networks route encrypted messages through a network of user operated nodes. The nodes cannot decrypt messages, only the recipient can decrypt. Examples of this include Onion routing (used with technologies like Tor) and Blockchains. A direct connection is never made, ensuring that the recipient cannot access the sender's metadata (eg, IP address). If the network uses onion routing, then the nodes can't either.

+ +{% + include cardv2.html + title="Session" + image="/assets/img/svg/3rd-party/session.svg" + description="Encrypted instant messenger using 3-hop onion routing to transfer communications. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group chatrooms." + website="https://getsession.org/" + privacy-policy="https://getsession.org/privacy-policy/" + github="https://github.com/oxen-io/session-desktop" + googleplay="https://play.google.com/store/apps/details?id=network.loki.messenger" + ios="https://apps.apple.com/app/session-private-messenger/id1470168868" + windows="https://getsession.org/windows" + linux="https://www.getsession.org/linux" + mac="https://getsession.org/mac" +%} + +
+
+
+

Advantages

+
    +
  • Minimal to no information is exposed to third parties.
  • +
  • Messages can be relayed even if one of the parties is offline.
  • +
+
+
+

Disadvantages

+
    +
  • Slow transfers and messages propagation.
  • +
  • Less reliable due to the random nodes routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
  • +
  • More complex to use as it requires the creation and backup of a private key.
  • +
+
+
+
From 0ddabbd87d166b1917f5aa8fe3e422b105418f7d Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 05:50:18 +0200 Subject: [PATCH 03/16] try to fix #2232 Signed-off-by: Stephen L. --- _config.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/_config.yml b/_config.yml index 25a9c2436f..64bc15dc7d 100644 --- a/_config.yml +++ b/_config.yml @@ -3,6 +3,7 @@ name: PrivacyTools description: You are being watched. PrivacyTools provides knowledge, encryption, and software recommendations to protect you against global mass surveillance. url: "https://www.privacytools.io" production_url: "https://www.privacytools.io" +repository: privacytools/privacytools.io sass: style: compressed plugins: From c79b2ff66b2a513f2dd052d85a4407c0c6aa7a28 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 20:23:14 +0200 Subject: [PATCH 04/16] add mention and link to Oxen blockchain and nodes distribution Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index f532dd5d22..7d7cd135ea 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -193,7 +193,7 @@

include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hop onion routing to transfer communications. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group chatrooms." + description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms." website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" From 417e414abd413e052b3e9dea651cf81170df0fbf Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 20:25:33 +0200 Subject: [PATCH 05/16] fix links formatting in description Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index 7d7cd135ea..ff2df344b5 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -193,7 +193,7 @@

include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms." + description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms." website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" From ea8b237ad28b048b9c6bb8f15046ca661ad7cb6f Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sat, 15 May 2021 20:34:04 +0200 Subject: [PATCH 06/16] add audit for Session messenger Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index ff2df344b5..2503446c53 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -193,7 +193,7 @@

include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms." + description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" From b69190e87b56560aa36d93bd7f573c318bf983c3 Mon Sep 17 00:00:00 2001 From: KeeJef Date: Tue, 18 May 2021 16:06:41 +1000 Subject: [PATCH 07/16] Change Session logo --- assets/img/svg/3rd-party/session.svg | 114 ++++----------------------- 1 file changed, 14 insertions(+), 100 deletions(-) diff --git a/assets/img/svg/3rd-party/session.svg b/assets/img/svg/3rd-party/session.svg index 3cc36ec7c3..3cb9d9c90c 100644 --- a/assets/img/svg/3rd-party/session.svg +++ b/assets/img/svg/3rd-party/session.svg @@ -1,100 +1,14 @@ - - - -image/svg+xml \ No newline at end of file + + + + + + From 8131351dc3cb515ae6ced6e5ad740265503c422b Mon Sep 17 00:00:00 2001 From: Stephen L Date: Mon, 24 May 2021 23:49:26 +0200 Subject: [PATCH 08/16] rework instant messenger section according to centralized/decentralized/distributed network typology --- _includes/sections/instant-messenger.html | 69 +++++++---- assets/img/svg/3rd-party/session.svg | 108 +++++++++--------- assets/img/svg/layout/network-centralized.svg | 1 + .../img/svg/layout/network-decentralized.svg | 1 + assets/img/svg/layout/network-distributed.svg | 1 + 5 files changed, 102 insertions(+), 78 deletions(-) create mode 100644 assets/img/svg/layout/network-centralized.svg create mode 100644 assets/img/svg/layout/network-decentralized.svg create mode 100644 assets/img/svg/layout/network-distributed.svg diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index 2503446c53..a37d4f8007 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -6,18 +6,21 @@

-

We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).

+

We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).

-

All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.

+

All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.

-

We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.

+

We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.

-

- - Centralized -

+

+ + Centralized +

-

Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.

+
+ Centralized network +

Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.

+
{% include cardv2.html @@ -64,10 +67,13 @@

Disadvantages

- Federated + Federated (decentralized)

-

Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.

+
+ Decentralized network +

Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.

+
{% include cardv2.html @@ -120,12 +126,28 @@

Worth Mentioning

  • Status.im - Encrypted instant messenger with an integrated Ethereum wallet (cryptocurrency) that also includes support for DApps (decentralized apps) (web apps in a curated store). Uses the Waku protocol (a fork of Whisper) for P2P communication. Only available for iOS and Android.
  • -

    - - Peer to Peer (P2P) +

    + + Distributed

    -

    Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.

    +
    +

    + Distributed network + Distributed network messengers connect through a network of nodes that relay messages to the recipient without a third-party server. Connection can then be established directly as with peer-to-peer networks, or indirectly through a rendez-vu node as in onion routing networks. +

    + +

    Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.

    + +

    Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (eg, Tor), nodes cannot decrypt messages, only the recipient can. Another example is blockchain technology, although there is no guarantee of anonymity.

    + +

    Softwares can combine multiple approaches, such as Briar using peer-to-peer for local network and Tor for remote connections over the internet, whereas Session always uses onion routing over a blockchain to incentivize nodes.

    +
    + +

    + + Peer-to-Peer (P2P) +

    {% include cardv2.html @@ -181,19 +203,16 @@

    Disadvantages

    -
    -

    - - Nodal -

    - -

    Nodal networks route encrypted messages through a network of user operated nodes. The nodes cannot decrypt messages, only the recipient can decrypt. Examples of this include Onion routing (used with technologies like Tor) and Blockchains. A direct connection is never made, ensuring that the recipient cannot access the sender's metadata (eg, IP address). If the network uses onion routing, then the nodes can't either.

    +

    + + Non Peer-to-Peer +

    {% include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." + description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" @@ -209,16 +228,16 @@

    Advantages

      -
    • Minimal to no information is exposed to third parties.
    • +
    • Minimal to no information is exposed to other parties, including recipients.
    • Messages can be relayed even if one of the parties is offline.

    Disadvantages

      -
    • Slow transfers and messages propagation.
    • +
    • Slow messages propagation.
    • Less reliable due to the random nodes routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
    • -
    • More complex to use as it requires the creation and backup of a private key.
    • +
    • More complex to use as it requires the creation and secured backup of a cryptographic private key.

    diff --git a/assets/img/svg/3rd-party/session.svg b/assets/img/svg/3rd-party/session.svg index 3cc36ec7c3..e7971bbec4 100644 --- a/assets/img/svg/3rd-party/session.svg +++ b/assets/img/svg/3rd-party/session.svg @@ -1,6 +1,4 @@ - - image/svg+xml \ No newline at end of file + id="g20" + transform="translate(0.0044,25.541)" + style="fill:#808080;fill-opacity:1"> diff --git a/assets/img/svg/layout/network-centralized.svg b/assets/img/svg/layout/network-centralized.svg new file mode 100644 index 0000000000..8a7c6eebd4 --- /dev/null +++ b/assets/img/svg/layout/network-centralized.svg @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/assets/img/svg/layout/network-decentralized.svg b/assets/img/svg/layout/network-decentralized.svg new file mode 100644 index 0000000000..aca84898af --- /dev/null +++ b/assets/img/svg/layout/network-decentralized.svg @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/assets/img/svg/layout/network-distributed.svg b/assets/img/svg/layout/network-distributed.svg new file mode 100644 index 0000000000..47555b17dc --- /dev/null +++ b/assets/img/svg/layout/network-distributed.svg @@ -0,0 +1 @@ + \ No newline at end of file From 99c017c16e520d21fd6d90aff688cc032b4126c0 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Tue, 25 May 2021 00:06:07 +0200 Subject: [PATCH 09/16] more margin for images Signed-off-by: Stephen L. --- assets/img/svg/layout/network-centralized.svg | 2 +- assets/img/svg/layout/network-decentralized.svg | 2 +- assets/img/svg/layout/network-distributed.svg | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/assets/img/svg/layout/network-centralized.svg b/assets/img/svg/layout/network-centralized.svg index 8a7c6eebd4..16d2e4c3ef 100644 --- a/assets/img/svg/layout/network-centralized.svg +++ b/assets/img/svg/layout/network-centralized.svg @@ -1 +1 @@ - \ No newline at end of file + \ No newline at end of file diff --git a/assets/img/svg/layout/network-decentralized.svg b/assets/img/svg/layout/network-decentralized.svg index aca84898af..1d4a63e149 100644 --- a/assets/img/svg/layout/network-decentralized.svg +++ b/assets/img/svg/layout/network-decentralized.svg @@ -1 +1 @@ - \ No newline at end of file + \ No newline at end of file diff --git a/assets/img/svg/layout/network-distributed.svg b/assets/img/svg/layout/network-distributed.svg index 47555b17dc..78b9d0e241 100644 --- a/assets/img/svg/layout/network-distributed.svg +++ b/assets/img/svg/layout/network-distributed.svg @@ -1 +1 @@ - \ No newline at end of file + \ No newline at end of file From 0fa2d742dec94e0955874af10248353972a80c69 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sun, 30 May 2021 00:04:21 +0200 Subject: [PATCH 10/16] update svg to be optimized and 128x128 Signed-off-by: Stephen L. --- assets/img/svg/layout/network-centralized.svg | 3 ++- assets/img/svg/layout/network-decentralized.svg | 3 ++- assets/img/svg/layout/network-distributed.svg | 3 ++- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/assets/img/svg/layout/network-centralized.svg b/assets/img/svg/layout/network-centralized.svg index 16d2e4c3ef..6ca7ea0914 100644 --- a/assets/img/svg/layout/network-centralized.svg +++ b/assets/img/svg/layout/network-centralized.svg @@ -1 +1,2 @@ - \ No newline at end of file + + diff --git a/assets/img/svg/layout/network-decentralized.svg b/assets/img/svg/layout/network-decentralized.svg index 1d4a63e149..c7da6860a0 100644 --- a/assets/img/svg/layout/network-decentralized.svg +++ b/assets/img/svg/layout/network-decentralized.svg @@ -1 +1,2 @@ - \ No newline at end of file + + diff --git a/assets/img/svg/layout/network-distributed.svg b/assets/img/svg/layout/network-distributed.svg index 78b9d0e241..5d8e5fef11 100644 --- a/assets/img/svg/layout/network-distributed.svg +++ b/assets/img/svg/layout/network-distributed.svg @@ -1 +1,2 @@ - \ No newline at end of file + + From 8bda231ca09b5ac3ab83f62b1b648553806c62c0 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Sun, 30 May 2021 03:10:30 +0200 Subject: [PATCH 11/16] generalize explanation (distributed ledger technology with blockchain being an example) Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index a37d4f8007..8d39d69fc7 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -139,7 +139,7 @@

    Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.

    -

    Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (eg, Tor), nodes cannot decrypt messages, only the recipient can. Another example is blockchain technology, although there is no guarantee of anonymity.

    +

    Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (e.g., Tor), nodes cannot decrypt messages, only the recipient can. Another example is distributed ledger technology (e.g., blockchains), although there is no guarantee of anonymity.

    Softwares can combine multiple approaches, such as Briar using peer-to-peer for local network and Tor for remote connections over the internet, whereas Session always uses onion routing over a blockchain to incentivize nodes.

    From cf22cd6dc835ceb5e9ea610e98a5273746880646 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Mon, 31 May 2021 19:16:20 +0200 Subject: [PATCH 12/16] clean up session.svg using inkscape optimized settings Signed-off-by: Stephen L. --- assets/img/svg/3rd-party/session.svg | 15 ++++----------- 1 file changed, 4 insertions(+), 11 deletions(-) diff --git a/assets/img/svg/3rd-party/session.svg b/assets/img/svg/3rd-party/session.svg index 6ea5948579..3787accb92 100644 --- a/assets/img/svg/3rd-party/session.svg +++ b/assets/img/svg/3rd-party/session.svg @@ -1,14 +1,7 @@ - - - + + - - \ No newline at end of file + + From 797070c2640bb4327b8b0bece0dc29c4ffe59a1b Mon Sep 17 00:00:00 2001 From: Stephen L Date: Tue, 1 Jun 2021 18:34:24 +0200 Subject: [PATCH 13/16] Change non-peer-to-peer --> anonymous routing Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 41 +++++++++---------- .../svg/layout/network-anonymous-routing.svg | 2 + 2 files changed, 21 insertions(+), 22 deletions(-) create mode 100644 assets/img/svg/layout/network-anonymous-routing.svg diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index 8d39d69fc7..f04bd3e67f 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -67,12 +67,12 @@

    Disadvantages

    - Federated (decentralized) + Federated

    Decentralized network -

    Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.

    +

    Federated messengers use multiple, independent, decentralized servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.

    {% @@ -125,30 +125,20 @@

    Worth Mentioning

    +
    -

    - - Distributed +

    + + Peer-to-Peer (P2P)

    Distributed network - Distributed network messengers connect through a network of nodes that relay messages to the recipient without a third-party server. Connection can then be established directly as with peer-to-peer networks, or indirectly through a rendez-vu node as in onion routing networks. + Peer-to-peer messengers connect to a distributed network of nodes to relay messages to the recipient without a third-party server. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.

    - -

    Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.

    - -

    Non peer-to-peer distributed networks route encrypted messages through a network of user operated nodes. The sender and recipient never interact directly, and hence there is no leak of IP addresses. With onion routing (e.g., Tor), nodes cannot decrypt messages, only the recipient can. Another example is distributed ledger technology (e.g., blockchains), although there is no guarantee of anonymity.

    - -

    Softwares can combine multiple approaches, such as Briar using peer-to-peer for local network and Tor for remote connections over the internet, whereas Session always uses onion routing over a blockchain to incentivize nodes.

    -

    - - Peer-to-Peer (P2P) -

    - {% include cardv2.html title="Briar" @@ -203,16 +193,23 @@

    Disadvantages

    -

    - - Non Peer-to-Peer -

    +

    + + Anonymous Routing +

    + +
    +

    + Anonymous routing network + A messenger using anonymous routing communicates encrypted messages through a virtual overlay network that hides the location of each node as well as the recipient and sender of each message. The sender and recipient never interact directly, and only meet through a secret rendez-vu node, so that there is no leak of IP addresses nor physical location. With onion routing networks (e.g., Tor), nodes cannot decrypt messages nor the final destination, only the recipient can. Each intermediary node can only decrypt a part that indicates where to send the still encrypted message next, until it arrives at the recipient who can fully decrypt it, hence the "onion layers". +

    +
    {% include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hop onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." + description="Encrypted instant messenger using 3-hops onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" diff --git a/assets/img/svg/layout/network-anonymous-routing.svg b/assets/img/svg/layout/network-anonymous-routing.svg new file mode 100644 index 0000000000..2a9632f77f --- /dev/null +++ b/assets/img/svg/layout/network-anonymous-routing.svg @@ -0,0 +1,2 @@ + + From bfa09d01165763e6ced67c07bd1c8819671b51bf Mon Sep 17 00:00:00 2001 From: Stephen L Date: Wed, 2 Jun 2021 04:20:54 +0200 Subject: [PATCH 14/16] extend description of P2P to address #1357 Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index f04bd3e67f..d7d3305f93 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -135,7 +135,7 @@

    Distributed network - Peer-to-peer messengers connect to a distributed network of nodes to relay messages to the recipient without a third-party server. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. + Peer-to-peer messengers connect to a distributed network of nodes to relay messages to the recipient without a third-party server. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient.

    From 066c67d73dbe9a9596a71f16b9dbd4a56ba50874 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Fri, 9 Jul 2021 18:55:00 +0200 Subject: [PATCH 15/16] Briar is also an anonymous network messenger + revamp audits as labels + add audits for all messengers if one is available Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 24 +++++++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index d7d3305f93..03738abbbe 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -26,8 +26,8 @@

    include cardv2.html title="Signal" image="/assets/img/svg/3rd-party/signal.svg" - description='Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS. Its protocol has also been indepedently audited (PDF)' - labels="color==warning::text==Requires phone number::tooltip==Signal requires your phone number as an personal identifier which means anyone you communicate with will see it.|text==VoIP" + description='Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS.' + labels="color==warning::text==Requires phone number::tooltip==Signal requires your phone number as an personal identifier which means anyone you communicate with will see it.|color==info::icon==fas fa-info-circle::text==Audited::link==https://eprint.iacr.org/2016/1013.pdf::tooltip==The protocol was independently audited.|text==VoIP" website="https://signal.org/" privacy-policy="https://signal.org/legal/" forum="https://forum.privacytools.io/t/discussion-signal/664" @@ -80,7 +80,7 @@

    title="Element" image="/assets/img/svg/3rd-party/element.svg" description='Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.' - labels="text==VoIP" + labels="color==info::icon==fas fa-info-circle::text==Audited::link==https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last::tooltip==The protocol was independently audited.|text==VoIP" website="https://element.io" privacy-policy="https://element.io/privacy" forum="https://forum.privacytools.io/t/discussion-element-io/665" @@ -144,6 +144,7 @@

    title="Briar" image="/assets/img/svg/3rd-party/briar.svg" description="Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis." + labels="color==warning::text==Warning::tooltip==If local mesh network is not needed, disable Wi-Fi and Bluetooth connections in Briar's options for maximal anonymity by only connecting through the Tor network.|color==info::icon==fas fa-info-circle::text==Audited::link==https://briarproject.org/news/2017-beta-released-security-audit/::tooltip==The client software was independently audited." website="https://briarproject.org" privacy-policy="https://briarproject.org/privacy-policy/" forum="https://forum.privacytools.io/t/discussion-briar/2114" @@ -205,11 +206,26 @@

    +{% + include cardv2.html + title="Briar" + image="/assets/img/svg/3rd-party/briar.svg" + description="Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis." + labels="color==warning::text==Warning::tooltip==If local mesh network is not needed, disable Wi-Fi and Bluetooth connections in Briar's options for maximal anonymity by only connecting through the Tor network.|color==info::icon==fas fa-info-circle::text==Audited::link==https://briarproject.org/news/2017-beta-released-security-audit/::tooltip==The client software was independently audited." + website="https://briarproject.org" + privacy-policy="https://briarproject.org/privacy-policy/" + forum="https://forum.privacytools.io/t/discussion-briar/2114" + gitlab="https://code.briarproject.org/briar/briar" + fdroid="https://f-droid.org/packages/org.briarproject.briar.android/" + googleplay="https://play.google.com/store/apps/details?id=org.briarproject.briar.android" +%} + {% include cardv2.html title="Session" image="/assets/img/svg/3rd-party/session.svg" - description="Encrypted instant messenger using 3-hops onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms. The protocol was independently audited (whitepaper)." + description="Encrypted instant messenger using 3-hops onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms." + labels="color==info::icon==fas fa-info-circle::text==Audited::link==https://getsession.org/session-code-audit/::tooltip==The client softwares on all platforms were independently audited.|color==info::icon==fas fa-info-circle::text==Whitepaper::link==https://arxiv.org/abs/2002.04609" website="https://getsession.org/" privacy-policy="https://getsession.org/privacy-policy/" github="https://github.com/oxen-io/session-desktop" From 35948235d8f4eedb318aa812c5546199aabcbe08 Mon Sep 17 00:00:00 2001 From: Stephen L Date: Fri, 9 Jul 2021 19:02:22 +0200 Subject: [PATCH 16/16] fix html anchor for anonymous-routing Signed-off-by: Stephen L. --- _includes/sections/instant-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index 03738abbbe..262c96fcf0 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -194,7 +194,7 @@

    Disadvantages

    -

    +

    Anonymous Routing