Encrypted Instant Messenger
If you are currently using an Instant Messenger like LINE, Telegram, Viber, WhatsApp, or plain SMS messages you should pick an alternative here.
{% include cardv2.html
title="Signal"
image="/assets/img/tools/Signal.png"
description="Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
All communications are end-to-end encrypted. Signal is free and open source."
website="https://signal.org/"
forum="https://forum.privacytools.io/t/discussion-signal/664"
github="https://github.com/signalapp"
android=""
ios=""
mac=""
windows=""
linux=""
%}
{% include cardv2.html
title="Wire"
image="/assets/img/tools/wire.png"
description='A free software End-to-End Encrypted chatting application that supports instant messaging, voice, and video calls. Full source code is available. Warning'
website="https://wire.com/"
forum="https://forum.privacytools.io/t/discussion-wire/750"
github="https://github.com/wireapp/"
android=""
ios=""
mac=""
windows=""
linux=""
web=""
%}
Complete Comparison
Worth Mentioning
- Briar - An ultra-secure peer-to-peer instant messenger that connects to contacts via Direct Wi-Fi, Bluetooth, or Tor over the internet, keeping its users protected from surveillance and censorship.
- RetroShare - An E2E encrypted instant messaging and voice/video call client. RetroShare supports both TOR and I2P.
- XMPP - Federated instant messaging protocol with OMEMO, OTR, or OpenPGP end-to-end encryption:
- Conversations (Android) - An open source Jabber/XMPP client for Android 4.4+ smartphones. OMEMO
- Gajim (FreeBSD, Linux, Windows) - An open source fully featured XMPP client. OMEMO
- Monal (iOS, MacOS) - An XMPP client in active development. OMEMO
- Other OMEMO ready clients.
- Kontalk - A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
- Keybase - Warning End-to-end encrypted messaging with social verification.
- Status - Experimental A free and open-source, peer-to-peer, encrypted instant messanger with support for DAPPs.
- Ricochet - Danger Experimental Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address.
Related Information
Updating the Tor binary included with Ricochet
Currently there are no known vulnerabilities with Ricochet. The software is safe to use as long as you update the included Tor binary to the latest version.
- Download the Tor Browser.
- Run the Tor Browser installer or extract package for your platform. Windows (.exe), MacOSX (.dmg) and Linux (.tar.bz2).
- Copy the Tor binary or create a symbolic link to it:
- Windows: Copy the Tor binary included with the Tor Browser and overwrite the old one included with Ricochet.
- Tor Browser binary:
%HOMEPATH%\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe
- Ricochet's included binary:
%HOMEPATH%\Desktop\Ricochet\tor.exe
- MacOSX: Assuming you copied the
Tor Browser.app
and Ricochet.app
from their respective .dmg install media to /Applications
:
Create a symbolic link to the Tor binary in Terminal. Ricochet will continue to use the up to date version of the Tor binary when you update the Tor Browser Bundle.
rm ~/Applications/Ricochet.app/Contents/MacOS/tor
ln -s ~/Applications/Tor\ Browser.app/Contents/Resources/TorBrowser/Tor/tor \
~/Applications/Ricochet.app/Contents/MacOS/tor
- Linux: Assuming you extracted the Tor Browser Bundle and Ricochet tarball to your home directory:
rm ~/ricochet/tor
ln -s ~/tor-browser_en-US/Browser/TorBrowser/Tor/tor ~/ricochet/tor