Tox, a Skype Replacement Built On 'Privacy First' 174
An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down."
Back door (Score:3)
Even if it's not true [......]
Considering all the revelations that have emerged about surveillance in those ten years, the possibility that it's not true seems barely worth considering.
Re: (Score:1)
The idea of backdoors is just convoluted and pointless, it's often a way of perpetuating some illusion of shady corporate and government collusion. Oddly enough the product is used by many different governments and other corporations across the globe so I've never quite understood who the supposed conspirators are - though it is often Microsoft and the US government while the rest of the world are bumbling fools living in ignorance, but these people who tell us all about these back doors (except what they a
Re:Back door (Score:5, Interesting)
"FBI Wants Backdoors in Facebook, Skype and Instant Messaging"
http://www.wired.com/2012/05/f... [wired.com]
".... drafted by the FBI, that would require social-networking sites and VoIP, instant messaging and e-mail providers to alter their code to make their products wiretap-friendly."
Then the world was given more details "Encrypted or not, Skype communications prove Ãoevitalà to NSA surveillance" May 14 2014
http://arstechnica.com/securit... [arstechnica.com]
As for the "nobody on the inside has ever leaked out." aspect try http://cryptome.org/2013-info/... [cryptome.org]
The "inside" can now be understood by aspects like "Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.Ã(TM)s"
http://www.nytimes.com/2013/09... [nytimes.com]
How past "parallel construction" and telco support will respond to any new "peer-to-peer and voice calling" will be interesting.
How did the US and UK get to past bespoke crypto telco hardware in the 1950's and beyond? Plain text always seemed to emerge just in time.
Re: (Score:2)
Leaving the conspiracy theories aside (indeed, who needs them, except strawman erectors) -- tell me, do you think for instance there were some average Janes and Joes that got rather a bad wrap, undeservedly so, during the housing and banking crises the other day?
Re: (Score:2)
Hows this.
We know-- for a fact-- that Skype has worked with the Chinese government to provide bugged versions of skype (TOM Skype). We know-- for a fact-- that Microsoft has access to provide call logs for law enforcement, on demand.
Call it what you like, but both of those are well documented and can be found in a 5 minute google search.
Re: (Score:2, Interesting)
If you send traffic to a central server, and if the traffic is unencrypted OR is encrypted by a key you don't control then monitoring your traffic without you being to prove it is absolutely possible.
You *always* send data to servers you dont control when you transmit data over the public net, everybody already knows that and anybody that assumed any sort of privacy when transmitting data over a public network is a deluded fool, clearly you are in that category.
I suppose to you that means it doesn't e
Re: (Score:2)
Re: (Score:2)
Wish I had mod points for ya (or that you had logged in)
Re: (Score:3)
Of course it's backdoored. The only reason why eBay bought Skype is to cross-correlate with PayPal accounts in exchange for taking the heat off threats of banking regulation.
it's a great idea with one major flaw (Score:5, Insightful)
Decentralized services are a great idea, but there is one big flaw. Not enough people care about it to get a critical mass of users. Virtually everyone outside a handful of tech geeks will keep using the centralized services, so to talk to people out there in the real world, you'll need to use the centralized services too. Or, restrict yourself to these decentralized networks and find they are mostly empty, maybe several thousands of users across the whole of the world.
And good luck trying to explain to Joe/Jane Sixpack how to use them. You have to fight against the centralized data-mined services that came preinstalled on their devices, and that's a non-starter for most people.
It fails not for technical reasons. It fails because of widespread tech illiteracy in the general population.
Re:it's a great idea with one major flaw (Score:5, Insightful)
Decentralized services are a great idea, but there is one big flaw. Not enough people care about it to get a critical mass of users.
There's a group of Hollywood celebrities that have just been made aware of the need for decentralized and more private internet services. I think people will care, albeit only after a problem has occured.
Re: (Score:1)
Do you think a single one of those celebrities will move to such a system?
I wager not one of the ones effected by it will.
Re: (Score:2)
Do you think a single one of those celebrities will move to such a system?
I really think they will if it's the easiest option. It's up to developers to make encrypted, decentralized storage the default and easy to use. Build it and they willl come (pun half-heartedly intended.)
Re: (Score:3)
Re: (Score:2)
There's a group of Hollywood celebrities that have just been made aware of the need for decentralized and more private internet services.
In that context what is the solution? Certainly not to host the services yourself. The security was beaten by a flaw in the server software that allowed a brute force attack to take place, so how does decentralization help you there?
Re: (Score:3)
Where "yourself" is one of a set of firms that specialize in very high security hosting for high-risk clients. Using an iphone locked them in to Apple's lowest-common denominator of secure hosting, and while that's great for the average low-value target, it isn't sufficient for someone with a lot to lose.
That's rubbish, you are not "locked" in to Apple's hosting, stop spreading FUD. You can quite easily turn off iCloud and use whatever service you want or no cloud storage at all, it is already decentralized. You are just swapping one supposedly secure service for another.
Re: (Score:2)
> You can quite easily turn off iCloud and use whatever service you want
I'm afraid I must say "good luck with that". The bar to replace services that are built into Iphones or Ipads by Apple, as a supported service and built directly into their operating systems, is quite high.
Re: (Score:3)
I'm afraid I must say "good luck with that".
Not sure why, I don't need luck because it already works fine with services like DropBox and Skydrive or there's apps from western digital and synology. I could even use the APIs to write my own if I wanted to.
Re: (Score:2)
> I don't need luck because it already works fine with services like DropBox and Skydrive
Neither of these are focused on end-to-end user security. The centralized password management for both systems, and presence of most deposited contents unencrypted, are profound price savings and software simplifications for those companies. But it puts both systems at risk of precisely the sort of overseas, strong-arm warrant or subpoena that Microsoft is facing right now from US courts for email stored in Ireland
Re: (Score:2)
Neither of these are focused on end-to-end user security.
So? The original question posed was about being "locked" into Apple's offering, which is not the case. Can you provide an alternative service that is "focused on end-to-end user security"?
Re: (Score:2)
> Can you provide an alternative service that is "focused on end-to-end user security"?
No. That's partly because the barrier to entry is so high, which I did mention. So services like a Skype replacement, or full blown custmer-privacy-centered services, are quite difficult to get started. And services like Dropbox admit, themselves, that they are not immune from subpoenas. (See https://www.dropbox.com/transp... [dropbox.com] for what little they're permitted to publish about search warrants or subpoenas.)
I may have be
Re: (Score:2)
Re: (Score:2)
Name one system that does keychain backup/restore inside the standard apple interface.
Why would I want to do that? Saving my passwords (encrypted or not) to a cloud service sounds like a fantastically stupid idea. I'll save photos and videos there but passwords? No thank you, I have no need for that.
Re: (Score:2)
Re: (Score:2)
The BBC news article about the hack had a quote from one of the celebrities saying that the pictures had already been deleted before they were stolen.
Deleted from the phone, not from iCloud. The hacker(s) gained access to the users' iCloud account where the files are accessible, they were not deleted.
Re:it's a great idea with one major flaw (Score:5, Insightful)
They just have to stop storing personal content 'on the cloud'. Don't buy into the idea of no local storage. Say NO to devices that don't have an SD slot ( sorry, Apple and Google...)
32g sd cards are really cheap now.
Re: (Score:2)
I agree with your idea of not buying into "no local storage", but ...
The device doesn't matter, it's the software. My 16gig iPhone has plenty of storage for my to do what I need/want without using cloud/off-device solutions. I don't need a device with sd cards. Software is the issue. The software I use IS going to send some information to a server SOMEWHERE for storage or re-routing - that is the problem. Having software that does proper peer-to-peer, fully encrypted with proper up-to-date encryption metho
An oxymoron ... (Score:3)
It fails not for technical reasons. It fails because of widespread tech illiteracy in the general population.
You do see what I mean, right?
it's a great idea with one major flaw (Score:3)
You can code a software layer into your consumer device that offers really good quality encryption.
The problem is not so much a back door, trap door, just that every letter and number entered on the device is open to hardware logging by default by a gov activated telco layer..
A person is walking around with a gps becon, live mic, camera and plain text capturing de
Re: (Score:2)
http://www.wired.com/2010/01/f... [wired.com]
FBI Seeking to Pay Telecoms to Store Records for Years and Provide Instant Access (07.18.07)
http://www.wired.com/2007/07/f... [wired.com]
FBI pressures Internet providers to install surveillance software (August 2, 2013)
http://www.cnet.com/news/fbi-p... [cnet.com]
Also recall Communications Assistance for Law Enforcement Act http://en.wikipedia.org/wiki/C... [wikipedia.org]
".... requiring that telecommunicati
Re: (Score:3)
It fails not for technical reasons. It fails because of widespread tech illiteracy in the general population.
We've largely solved the issue with things like magnet links and decentralized databases.
The issue we still haven't solved is in our mind: We believe everyone needs to have "tech literacy", completely forgetting that every invention in history became successful only after someone made it easy to use for people without learning all the mechanical details about it. When only car mechanics could drive a car, the total number of cars in the world was less than that in your local shopping malls parking lot today
xmpp exists today. (Score:1)
Why reinvent the wheel, again?
Re: (Score:2)
Not entirely true. They are no more centralised than email servers. Each domain gets to nominate their own XMPP servers via DNS - which can be shared across cooperating domains.
Re: (Score:2)
Does this count? https://play.google.com/store/... [google.com]
Or maybe this (Jitsi)? https://download.jitsi.org/jit... [jitsi.org]
Or this (Talkonaut)? http://talkonaut.android.infor... [informer.com]
Not what Skype is for me. (Score:1)
I don't use skype for a 'chat box.' Really, I hardly 'chat' at all anymore. Did enough of that in the late 80's to early 90's. I use skype as my long distance phone carrier. As long as I'm at home or have a wifi connection, I can call any phone in the continental US at no extra cost. This costs me about $4 a month. It's a nomadic sort of thing, I used to do it with an iPod touch, but now use an unsubscribed Android phone (the iPod touch 'for the rest of us', which even has an SD slot!). When home I make lon
Re: (Score:2)
I use SIP for my PoTS gateway. It's pretty seamless. Something like Tox, if it works, would be an incremental improvement.
Tox? What happened to BitTorrent Chat? (Score:2)
Tox? What happened to BitTorrent Chat? I though the bittorrent folks themselves were making a secure decentralised chat client, it even made news on slashdot once.
Re: (Score:2, Informative)
It's been renamed to Bleep and is in closed pre-alpha testing:
http://blog.bittorrent.com [bittorrent.com]
Microsoft Gave the NSA Backdoor access to Skype .. (Score:4, Informative)
Diaspora (Score:1)
Who wants to meet up on Diaspora and chat about Tox?
Key exchange (Score:3)
Re: (Score:3, Interesting)
I discussed it with one of the admins on their IRC.
"it's up to the users to give their public key to their friends in a way that it won't be intercepted in transit and replaced"
Re: (Score:3)
It could be handled like SSH: when you get an invite to connect to someone, their key fingerprint is displayed. If you are paranoid, you can verify the fingerprint via alternative channels. Otherwise, you blindly accept it. In either case, you are protected against man in the middle attacks after that first connection is made. Also, if you did accept a fake key, any time you try to talk to that person over a network where the man in the middle is not present will trigger a key mismatch, revealing that an at
Re: (Score:2)
Would be worth a social experiment just to prove you idiots wrong
Re:Key exchange (Score:5, Interesting)
And how do you exchange key? Do they plan a web of trust à la GPG?
A better approach would be to generate a random session key and each user's client would display some sort of hash (it doesn't need to be really long: 6 or 8 digits would suffice) of that key. Assuming the two parties know each other and recognize each other's voice and/or face, one of them can read the hash to the other. If there's a MITM attack, they won't match. As I said, the hash doesn't need to be long, since one mismatch would indicate trouble.
Re: (Score:2)
That's a good idea. You could even present the hash in a more accessible way, like picking two words from a dictionary or showing three icons from a fixed set.
Re: (Score:2)
Re:Key exchange (Score:4, Informative)
Phil Zimmermann has already done all this. It's called ZRTP.
https://en.wikipedia.org/wiki/... [wikipedia.org]
https://www.youtube.com/watch?... [youtube.com]
Re: (Score:2)
And how do you exchange key? Do they plan a web of trust à la GPG?
That was one of my first questions. The answer is; however you want. They provide an "easy" (hence vulnerable) method for doing so, but you can check the public key hash against your securely transferred value before approving a key if you want.
Or, slightly differently; this is not a key exchange system, just a comm system you can use once you have authenticated a key to your level of security requirement.
Kazaa (Score:3)
Hmm, interesting. It might be worth pointing out that Skype was originally based on a decentralized service pushed through the Kazaa network:
http://arxiv.org/abs/cs/041201... [arxiv.org]
Of course, the problem with the Skype system (as it was when that paper was written) is that the decentralised nature of the network means that your video call could be routed through any number of Skype network nodes (i.e. computers) before it arrives at its destination. I think now Microsoft has replaced most of the supernodes with microsoft servers, so replace "any number of Skype network nodes" with "any number of Microsoft servers".
Presumably Tox is doing something similar to going back to the roots of Skype, with maybe a bit more encryption thrown in.
Re:Kazaa (Score:5, Insightful)
Re: (Score:2)
I have noiced the same thing on my skype in the past. I am fine with contributing some p2p bandwidth but wish the program was a bit more upfront about telling you about it.
On a separate but related issue, I used to use netstat for the same kind of thing you did, but now I run a program called nethogs, which is a command line tool a lot like top, but shows bandwidth usage by process in real time in more sane units like kb/s instead of the ugly packet buffer counts netstat uses which are kind of hard to read
Re: (Score:1)
Skype CAN and DOES read your messages, and quite probably your voice and video too.
Send a text chat message with a unique one time URL to your own box in it over Skype, such as:
http://yourbox.com/laks2312kjceie
You will see a bot fetch you. Skype scraped the link out of your so called privately encrypted chat.
Google it if you don't believe me.
SKYPE CANNOT BE TRUSTED, EVER!!
NO CLOSED SOURCE CAN BE TRUSTED!!!!!
Quit freaking using closed source, there's no reason to anymore.
Possibly a performance related change (Score:2)
I'm curious whether Skype changed to a more centralized service primarily because of the mobile world. Skype used to be a huge connection and battery hog on phones primarily because of the decentralized nature. Skype used to send messages through that were 'pending' to a contact even when your phone was in standby, because it was constantly trying to push the message to the user.
After microsoft acquired Skype, one of the first changes was this was removed, but it made it difficult to send messages sometim
Privacy Last (Score:3, Informative)
Readers of this story will have noticed the links to four of the major social media sites, including Facebook.
Since the earliest days of USENET and IRC Chat, the geek has a flawless record of making one-on-one communication over the Internet as painful a process as possible for the non-technical user.
It took the commercial services like Sype to break the spell.
Re: (Score:1)
Even just downloading and running it is a PITA. Click the flashy download button on the front page and you get to a crappy wiki page listing several "proof of concept clients" - pick one! Of course, if you look further in the Wiki you'll find that there's about a dozen other clients as well, and none with the complete feature set. So now we have gone from downloading and installing to reading, studying, pondering and failing... great way to make people use your software!
Oh, about the failing part: why isn't
Re: (Score:3)
Since the earliest days of USENET and IRC Chat, the geek has a flawless record of making one-on-one communication over the Internet as painful a process as possible for the non-technical user.
Don't be facetious. One-on-one communication could be much more painful. In the specific case of secure (ie: end-to-end encrypted) communication, Tox is approaching the theoretical limit of simplicity. Key exchange has a mathematically bound minimum complexity in order to be secure. The reason Skype is not secure is pr
Re: (Score:3)
Mandatory linux 4.3 upgrade (Score:2)
It always seemed we could at least sandbox Skype as a limited unique user, but 4.3 requires Pulse and pulse is increasingly the de facto sound system over alsa. Correct me if I'm wrong but doesn't pulse running at the user level only allow ONE user and system-wide utilization is vehemently discouraged by the developers for SECURITY reasons? If so, it seems like Microsoft and the NSA have worked out a way to p0wn any linux box where a person has installed a working 4.3 Skype.
I guess you could still use it fo
Re: (Score:2)
Correct me if I'm wrong but doesn't pulse running at the user level only allow ONE user and system-wide utilization is vehemently discouraged by the developers for SECURITY reasons?
No, it's the other way round: Running PulseAudio as a system daemon (as opposed to the default way of per-user sessions) has security implications [freedesktop.org].
Fucking 'Dependencies" (Score:1)
Just tried to install it after adding the PPA and it's missing mysterious dependencies, thus cannot be installed. Rubbish. Promotion should offer an incentive, not a host of obstructions! Back to Jitsi, cunts.
Toxic? (Score:1, Interesting)
Tox is licensed under GPL v3 which is incompatible with iOS. Brilliant idea to exclude one of the most popular mobile platforms, this will surely replace Skype.
Trust agility (Score:2)
Easy way to make this much more useable is to keep the current user rendezvous infrastructure, but use a layer on top for key exchange that goes through user-elected central servers.
The entire Moxie Marlinspike's trust agility thesis. Let the users choose the central entity that they trust for making the rendezvous via a plugin or a high level protocol layer - something as simple as a REST api over https. Every trust provider just has to provide an API endpoint for signing and exchanging keys.
App to user :
The people (Score:2)
I believe security is good if it accomplishes what it is intended for. But many that are not secure because for a decade they were tol
The public key... (Score:2)
Re: (Score:2)
Bring back the well connected internet (Score:2)
Re:Oh god why. (Score:5, Insightful)
OH SHIT
My IP gets exposed? Like how I've just sent it to Slashdot and the countless routers and proxies between my PC and the Slashdot servers?
Re: (Score:2)
Re: (Score:3)
The only way to stop your IP from being broadcast around the internet is to not use the internet.
The only way to receive a packet of data is for someone else to know your IP address. Either the entity initiating the send, or some kind of proxy along the way.
It's how the internet works.
Please explain how it's a legitimate concern and how to alleviate it.
Re: (Score:2, Insightful)
I get what you are saying, but exposing IP addresses to 3rd parties isn't typically desirable.
Case in point, I don't have your IP address. And you don't have mine.
Sure email works like that (although possibly less so in current era with gmail and such, then again maybe not), but many services don't. Sure, the service provider --- the middleman --- has access to that, but the other users don't.
A solution to a problem isn't necessarily a knee-jerk opp
Re: (Score:2)
I don't have your IP, you don't have mine. The 3rd party in the middle does. There is a single point where all interaction with Slashdot can be intercepted.
I get what you are saying, but exposing IP addresses to 3rd parties isn't typically desirable.
What? That's exactly what you're advocating.
The flaw in the system is the central server.
Email works fine how it is, because of the requirement to store messages when recipients are offline. Yet it still doesn't suffer the problem of all messages going through a single entity. You're free to connect directly to the recipients mail server. You're not forc
Re: (Score:2)
There you go again.
I would say that doesn't anonymity contribute to a healthy internet
That's exactly what you lose when you route all your communications through a single provider. You're left with pseudonymity.
Re: (Score:1)
You seem to operate from the idea that communications network is separate from corporate control or government observation. But it isn't.
You can wish it were. It does not make it so.
Hence, your ideas aren't from a position of experience like you wish to believe, but rather inexperience. Which is my point.
I hope you learned something today.
Re: (Score:3)
That's where encryption comes in to play when routing data anonymously. [wikipedia.org]
Re: (Score:2)
We have TOR for that.
Don't make developers implement stuff that should be handled in different layers of the communication stack. The code will only get more hairy and less secure.
Re: (Score:1)
Re: (Score:3)
aka http://en.wikipedia.org/wiki/O... [wikipedia.org]
Re: (Score:3, Insightful)
As with nearly everything in life, privacy and security are not all-or-nothing, black-or-white issues - instead it is a set of trade-offs, what do you have to give up in order to get a desired result. It is at least a 2-dimensional spectrum where limiting exposure to the minimum necessary nodes versus any node that takes an interest is preferrable.
Look at it this way - most people don't have a problem giving their credit card number to a website when they make a purchase but would not find it acceptable to
Re: (Score:2)
Time to go back to IPX/SPX and NetBIOS
Re: (Score:2)
The only way to stop your IP from being broadcast around the internet is to not use the internet.
Or just use Tor or a VPN. The point is to hide "your" IP address, i.e. the one that can link information back to your internet connection.
Re: (Score:2)
Either the entity initiating the send, or some kind of proxy along the way.
It's how the internet works.
Please explain how it's a legitimate concern and how to alleviate it.
Just because it's how the Internet works, doesn't mean it might not be a problem. There's a tin-foil hat brigade who use VPNs, after all.
Crypto analogy: the Internet works in plain-text. That doesn't mean plain-text is always appropriate.
Re: (Score:2)
It is a legitimate concern. Mocking it doesn't allay the concern.
A legitimate concern? Man! I want some of what you've been smoking, buddy!
I'd be really interested to know how one can send and receive data across the Internet without sharing your IP address with each intervening router, as well as the endpoint. I've been doing IP networking (since you're obviously rather thick, I'll explain that IP is the Internet Protocol which is the basis for all communications across the Internet. You can find out more with the TCP/IP Tutorial [ietf.org] and the Internet Protocol Specificat [ietf.org]
Re: (Score:2)
It is a legitimate concern. Mocking it doesn't allay the concern.
Oh, and I wouldn't dream of mocking your "point." I'll just mock you. You're certainly asking for it.
Re: (Score:1)
And my point with be correct the entire time while you do it, regardless of whether or not you think attacking the conveyor of a correct and valid idea has merit.
Re: Oh god why. (Score:2)
Pipe it through a VPN
Re: (Score:2)
Re: (Score:2)
On slashdot, your IP doesnt get exposed to everyone, silly. It only gets exposed to slashdot (and routers in between if you are not using SSL). Finding your IP (and hence your location), by just your name viperidaenz, is a little bit worrying and a valid concern. If you dont find it worrying, you should start signing each of your slashdot posts with your current IP.
Re: (Score:2)
Finding my IP just by my name viperidaenz requires nothing more than an NSL [wikipedia.org].
Regards,
viperidaenz
IP: 10.0.102.54
ps: there may be one or more network address translations and proxy servers in the way.
Re: (Score:2)
Nope, it actually just requires your skype (or Tox) name. If you dont like your IP to be exposed, I am sure you will understand the concerns about tox/skype exposing IPs.
Re: (Score:2)
With SSL, they only have source and destination IP, not your username. So association between username and IP is not possible.
Re: (Score:2)
Skype already leaks your IP anyway (both to active callers and to anyone that requests it as long as they know your username.)
It's common knowledge in live streaming that you should hide your skype username when streaming to prevent DoS attacks.
http://krebsonsecurity.com/201... [krebsonsecurity.com]
Re: (Score:2)
Go ahead I'm not afraid of exposing myself.
Re:Oh Great Just What We (Don't) Need (Score:4, Funny)
You mean peer to peer, instead of relaying via a server?
Re: (Score:1)
It's so bad, Microsoft doesn't even make it easy to kill it off. Even Scott Adams made a Dilbert cartoon about how bad it is:
http://dilbert.com/strips/comi... [dilbert.com]
Re: (Score:2)
Re: (Score:1)
"So now we're proposing something even worse."
Why do you think it will be worse? Give them a chance and let's see the released version.
Re: (Score:3)
You have to be seriously insane to even consider trying to do real time video over something akin to Bittorrent.
A few months ago, I would have agreed with you. But I've been using the PopcornTime [time4popcorn.eu] app since then, and it reliably delivers HD streams with few if any stutters. There's no reason to believe a single (video+)voice stream wouldn't be possible using a similar approach....
Re: (Score:2)
It is in fact the exact approach used by Skype in many circumstances. Peer-to-peer voip is neither novel nor difficult.
Re: (Score:2)
It's really not that hard at all.
http://en.wikipedia.org/wiki/Off-the-Record_Messaging#Authentication [wikipedia.org]
and it comes with a very good implementation and pedigree,
https://en.wikipedia.org/wiki/ZRTP [wikipedia.org]
Here's a video demo of ZRTP in use:
https://www.youtube.com/watch?v=udBBDHT-_UA [youtube.com]
So as far as the user is concerned, there's not reason it can't be dead simple.