diff --git a/_config.yml b/_config.yml
index 25a9c2436f..64bc15dc7d 100644
--- a/_config.yml
+++ b/_config.yml
@@ -3,6 +3,7 @@ name: PrivacyTools
description: You are being watched. PrivacyTools provides knowledge, encryption, and software recommendations to protect you against global mass surveillance.
url: "https://www.privacytools.io"
production_url: "https://www.privacytools.io"
+repository: privacytools/privacytools.io
sass:
style: compressed
plugins:
diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html
index c0cc44d35b..262c96fcf0 100644
--- a/_includes/sections/instant-messenger.html
+++ b/_includes/sections/instant-messenger.html
@@ -6,25 +6,28 @@
If you are currently using an Instant Messenger like Telegram, LINE, Viber, WhatsApp, or plain SMS, you should pick an alternative here.
-
We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
+
We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
-
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
+
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
-
We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
+
We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
-
-
- Centralized
-
+
+
+ Centralized
+
-
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
+
+
+
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
+
{%
include cardv2.html
title="Signal"
image="/assets/img/svg/3rd-party/signal.svg"
- description='Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS. Its protocol has also been indepedently audited (PDF)'
- labels="color==warning::text==Requires phone number::tooltip==Signal requires your phone number as an personal identifier which means anyone you communicate with will see it.|text==VoIP"
+ description='Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS.'
+ labels="color==warning::text==Requires phone number::tooltip==Signal requires your phone number as an personal identifier which means anyone you communicate with will see it.|color==info::icon==fas fa-info-circle::text==Audited::link==https://eprint.iacr.org/2016/1013.pdf::tooltip==The protocol was independently audited.|text==VoIP"
website="https://signal.org/"
privacy-policy="https://signal.org/legal/"
forum="https://forum.privacytools.io/t/discussion-signal/664"
@@ -67,14 +70,17 @@
Federated
-
Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
+
+
+
Federated messengers use multiple, independent, decentralized servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
+
{%
include cardv2.html
title="Element"
image="/assets/img/svg/3rd-party/element.svg"
description='Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.'
- labels="text==VoIP"
+ labels="color==info::icon==fas fa-info-circle::text==Audited::link==https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last::tooltip==The protocol was independently audited.|text==VoIP"
website="https://element.io"
privacy-policy="https://element.io/privacy"
forum="https://forum.privacytools.io/t/discussion-element-io/665"
@@ -119,19 +125,26 @@
Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.
+
+
+
+ Peer-to-peer messengers connect to a distributed network of nodes to relay messages to the recipient without a third-party server. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient.
+
+
{%
include cardv2.html
title="Briar"
image="/assets/img/svg/3rd-party/briar.svg"
description="Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis."
+ labels="color==warning::text==Warning::tooltip==If local mesh network is not needed, disable Wi-Fi and Bluetooth connections in Briar's options for maximal anonymity by only connecting through the Tor network.|color==info::icon==fas fa-info-circle::text==Audited::link==https://briarproject.org/news/2017-beta-released-security-audit/::tooltip==The client software was independently audited."
website="https://briarproject.org"
privacy-policy="https://briarproject.org/privacy-policy/"
forum="https://forum.privacytools.io/t/discussion-briar/2114"
@@ -180,3 +193,65 @@
Disadvantages
+
+
+
+ Anonymous Routing
+
+
+
+
+
+ A messenger using anonymous routing communicates encrypted messages through a virtual overlay network that hides the location of each node as well as the recipient and sender of each message. The sender and recipient never interact directly, and only meet through a secret rendez-vu node, so that there is no leak of IP addresses nor physical location. With onion routing networks (e.g., Tor), nodes cannot decrypt messages nor the final destination, only the recipient can. Each intermediary node can only decrypt a part that indicates where to send the still encrypted message next, until it arrives at the recipient who can fully decrypt it, hence the "onion layers".
+
+
+
+{%
+ include cardv2.html
+ title="Briar"
+ image="/assets/img/svg/3rd-party/briar.svg"
+ description="Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis."
+ labels="color==warning::text==Warning::tooltip==If local mesh network is not needed, disable Wi-Fi and Bluetooth connections in Briar's options for maximal anonymity by only connecting through the Tor network.|color==info::icon==fas fa-info-circle::text==Audited::link==https://briarproject.org/news/2017-beta-released-security-audit/::tooltip==The client software was independently audited."
+ website="https://briarproject.org"
+ privacy-policy="https://briarproject.org/privacy-policy/"
+ forum="https://forum.privacytools.io/t/discussion-briar/2114"
+ gitlab="https://code.briarproject.org/briar/briar"
+ fdroid="https://f-droid.org/packages/org.briarproject.briar.android/"
+ googleplay="https://play.google.com/store/apps/details?id=org.briarproject.briar.android"
+%}
+
+{%
+ include cardv2.html
+ title="Session"
+ image="/assets/img/svg/3rd-party/session.svg"
+ description="Encrypted instant messenger using 3-hops onion routing to transmit communications via Oxen blockchain's nodes that are distributed worldwide. All communications are E2EE encrypted by default, supporting 1-on-1, private group and public group textual chatrooms."
+ labels="color==info::icon==fas fa-info-circle::text==Audited::link==https://getsession.org/session-code-audit/::tooltip==The client softwares on all platforms were independently audited.|color==info::icon==fas fa-info-circle::text==Whitepaper::link==https://arxiv.org/abs/2002.04609"
+ website="https://getsession.org/"
+ privacy-policy="https://getsession.org/privacy-policy/"
+ github="https://github.com/oxen-io/session-desktop"
+ googleplay="https://play.google.com/store/apps/details?id=network.loki.messenger"
+ ios="https://apps.apple.com/app/session-private-messenger/id1470168868"
+ windows="https://getsession.org/windows"
+ linux="https://www.getsession.org/linux"
+ mac="https://getsession.org/mac"
+%}
+
+
+
+
+
Advantages
+
+
Minimal to no information is exposed to other parties, including recipients.
+
Messages can be relayed even if one of the parties is offline.
+
+
+
+
Disadvantages
+
+
Slow messages propagation.
+
Less reliable due to the random nodes routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
+
More complex to use as it requires the creation and secured backup of a cryptographic private key.
+
+
+
+
diff --git a/assets/img/svg/3rd-party/session.svg b/assets/img/svg/3rd-party/session.svg
new file mode 100644
index 0000000000..3787accb92
--- /dev/null
+++ b/assets/img/svg/3rd-party/session.svg
@@ -0,0 +1,7 @@
+
+
diff --git a/assets/img/svg/layout/network-anonymous-routing.svg b/assets/img/svg/layout/network-anonymous-routing.svg
new file mode 100644
index 0000000000..2a9632f77f
--- /dev/null
+++ b/assets/img/svg/layout/network-anonymous-routing.svg
@@ -0,0 +1,2 @@
+
+
diff --git a/assets/img/svg/layout/network-centralized.svg b/assets/img/svg/layout/network-centralized.svg
new file mode 100644
index 0000000000..6ca7ea0914
--- /dev/null
+++ b/assets/img/svg/layout/network-centralized.svg
@@ -0,0 +1,2 @@
+
+
diff --git a/assets/img/svg/layout/network-decentralized.svg b/assets/img/svg/layout/network-decentralized.svg
new file mode 100644
index 0000000000..c7da6860a0
--- /dev/null
+++ b/assets/img/svg/layout/network-decentralized.svg
@@ -0,0 +1,2 @@
+
+
diff --git a/assets/img/svg/layout/network-distributed.svg b/assets/img/svg/layout/network-distributed.svg
new file mode 100644
index 0000000000..5d8e5fef11
--- /dev/null
+++ b/assets/img/svg/layout/network-distributed.svg
@@ -0,0 +1,2 @@
+
+