- ctiacademy
- October 7, 2024
- No Comments
7 Encrypted Messaging Apps That Safeguard Your Privacy
7 Encrypted Messaging Apps That Safeguard Your Privacy
This article was written by our student Mehmet Akif Aydogmus.
Telegram CEO Pavel Valeryevich Durov’s statement following his arrest in France shocked Telegram users. When Durov announced that he would respond to government requests for user data, many threat actors and privacy-oriented users lost trust in Telegram. While Telegram has long been considered a secure communication app, this development has prompted users to turn to alternative and more secure platforms. In this blog post, we will take an in-depth look at security and privacy-oriented communication apps that can be an alternative to Telegram.
Why Should We Look for Alternatives?
While Telegram only offered end-to-end encryption in “secret chat” mode, the server-side encryption of other chats was seen as a security vulnerability. But after Durov’s decision to share data with governments, this vulnerability has only grown. Users became concerned about what data could be shared. Threat actors, in particular, have sought to find another platform to replace Telegram to avoid the risk of exposing their illegal activities.
So what are the alternatives that provide the same features as Telegram but are considered more secure? Below, we examine some communication apps that do not share data with governments and prioritize privacy.
- TFC
- Briar
- Cwtch
- TryQuiet
- Ricochet Refresh
- Speek
- Signal
1 – TFC
In today’s digital world, the security and privacy protection offered by messaging applications has become more critical than ever for users. Especially in an environment of increasing cyber threats and unauthorized data access, one of the best solutions for users seeking anonymity and data security is TFC (Tinfoil Chat).
TFC is an open-source messaging platform available on GitHub and is specifically designed to protect its users from various cyber threats. It provides advanced protection against serious threats such as passive collection, MITM attacks (man-in-the-middle attacks) and remote key exfiltration. This makes it a particularly attractive option for users who share sensitive data or seek high standards of privacy.
Full Anonymity and Security with TOR v3
One of the most notable features of TFC is that all messages are transmitted over the TOR v3 network. In this way, users remain completely anonymous when sending or receiving messages and their IP addresses are secured. The TOR network provides a strong layer of defense against monitoring and surveillance from the outside world. This allows TFC to offer maximum privacy to its users.
Metadata Protection
While most modern messaging apps encrypt users’ message content, they fall short of protecting metadata, such as user activity and the devices from which messages are sent. TFC, however, comprehensively protects users’ metadata, not just message content. This prevents third parties from sharing information about who users communicate with, when they communicate, and on which devices.
Alice enters messages and commands into the Transmitter Program running on the source computer. The Transmitter Program encrypts and signs the plaintext data, then transmits the encrypted data over the data diode to the network computer.
The Relay Program on Alice’s network computer transmits commands and copies of the output messages to the destination computer via the data diode. The Receiver Program on Alice’s target computer authenticates, decrypts and processes the incoming message/command.
Alice’s Relay Program sends the message and files to Bob via the Tor Onion Service. Bob’s Relay Program’s web client receives the encrypted data from Alice’s Onion Service and transmits it via data diode to Bob’s destination computer. Bob’s Receiving Program authenticates, decrypts and processes the message/file.
When Bob replies, he enters his message into the Transmitter Program on his source computer. The same process works in reverse and Alice reads the message from the Receiver Program on her destination computer. All these processes happen seamlessly and automatically.
One negative feature is that it requires more than one device for installation and is difficult. This causes the application to appeal to a more niche audience rather than a general audience.
Advantages and Disadvantages
Positive Aspects:
- TOR v3 connectivity: Hides users’ IP addresses and enables anonymous transmission of messages.
- End-to-end encryption: Message contents are only visible to the sender and receiver.
Metadata protection: Information about user activity is securely stored and not shared. - Open source: All source code for the app is available on GitHub, and anyone can review the code and conduct independent audits for vulnerabilities.
Negative Aspects:
- Installation Difficulty: TFC has a structure that can be difficult to install and use for the average user. It requires multiple devices and steps, making it appeal to a more niche audience.
- Complicated Use: While it does not have a user-friendly interface, the user experience can be challenging for non-technical users.
2- Briar
Briar is an application that enables messaging between users directly over encrypted connections without the need for a central server. All communication is end-to-end encrypted so that messages can only be decrypted by the recipient and are protected from outside interference. When there is an internet connection, it hides users’ identities and relationships by synchronizing over the Tor network. When the internet is down, data can be transferred via Bluetooth, Wi-Fi or memory cards, so communication can continue even in a crisis.
Briar offers not only private messaging but also public forums and blogs, creating a broad communication platform. It is resilient to threats of censorship and surveillance because there is no central server, so content cannot be deleted or blocked. The Briar Mailbox feature allows users to securely forward messages even when they are online at different times. In the long term, Briar aims to add crisis mapping and collaboration features with secure and distributed applications.
Positive features
- Messages are protected with end-to-end encryption.
- The user’s messages are stored and encrypted as local storage on the user’s device, not on a server.
- Even if there is no internet, you can send messages using bluetooth and wifi.
- It is a completely open source application.
- You can use it on Android, macOS, Linux, Windows platforms.
- The application includes a forum, private groups, journals (note taking) and personal messaging.
- Even when users are offline, Briar Mailbox makes it possible to deliver messages securely.
- TOR v3 is used for messaging.
- Thanks to the Tor network, Briar hides who users are communicating with against eavesdropping.
- Since there is no central server, Briar forums are resistant to denial of service attacks and users can access content even when offline.
- The interface design is simple and usable.
Negative features
- Some of the features available on the Android app are not available on the desktop app.
- There is no app for iOS.
3- Cwtch
Cwtch is a decentralized, privacy-preserving and metadata-resilient messaging app. Its name means “hug that creates a safe space” in Welsh.
Cwtch has no centralized service or network; users can host their own safe space or provide infrastructure to others. The Cwtch protocol is open source and anyone can add bots, services or user interfaces to it. All communication is end-to-end encrypted and takes place over Tor v3 onion services. Thanks to metadata resistance, no information, messages or protocol metadata is shared without the explicit consent of the users.
Positive features:
- Support for Windows, Linux, MacOS and Android.
- There is no central server.
- It uses TOR v3 network and has end-to-end encryption.
- Metadata data is secure.
Negative features:
- It has a complex UI design.
- Difficult to use.
4- TryQuiet
TryQuiet is a decentralized communication platform designed for team messaging, with an interface and usage similar to Slack. Unlike traditional messaging platforms, TryQuiet operates over the TOR network and doesn’t require a central server. This decentralized approach ensures enhanced privacy and security, as all communication happens through encrypted channels with high anonymity, making it harder for third parties to intercept or trace messages.
Key Technical Features:
- TOR-Based Communication:
TryQuiet uses the TOR (The Onion Router) network to facilitate anonymous communication. TOR hides users’ locations and usage from network surveillance and traffic analysis, ensuring privacy. All message transfers are routed through multiple volunteer-operated servers, encrypting data at multiple levels. This setup makes it difficult to trace the message’s origin or destination. - Decentralized Architecture with OrbitDB:
Unlike platforms that rely on centralized servers for data storage and synchronization, TryQuiet uses OrbitDB, a distributed, peer-to-peer database built on IPFS (InterPlanetary File System). This allows each community to have its own isolated, decentralized database. Message synchronization happens across connected devices, making it impossible for one community’s data to be accessed by users in another, even in encrypted form. This isolation enhances security, as no single point of failure exists in the system. - Community-Based Invites:
To join a community in TryQuiet, users need an invitation code. This is a critical feature to prevent unauthorized access. Only users with the code can join the group, adding an extra layer of privacy and control. Each community forms its own secure communication network. - Cross-Platform Support:
TryQuiet offers broad support across multiple operating systems, including Windows, macOS, Linux, Android, and iOS. This ensures that users can communicate securely across different devices and environments, catering to teams with diverse technological setups.
- Decentralized:
No central server or single point of control exists, significantly reducing the chances of centralized data breaches. Each community operates within its own network, ensuring complete autonomy and privacy. This is a significant advantage compared to centralized services like Slack, where user data is stored on a company’s servers. - Privacy by Default:
Thanks to the use of TOR, TryQuiet ensures that user communication is anonymous and cannot be easily traced or intercepted. This makes it particularly useful for organizations or communities that require a high level of confidentiality. - Cross-Platform Compatibility:
TryQuiet is available on a variety of platforms, ensuring accessibility regardless of a user’s preferred operating system.
Cons:
- Installation Issues on Windows:
Some users have reported issues when installing the Windows version of TryQuiet. These errors can disrupt the installation process, requiring additional troubleshooting steps or even alternative installation methods. - Android Bugs:
The Android app has been reported to contain bugs that affect usability, such as crashes or synchronization issues. These bugs may hinder the overall user experience on Android devices, especially when it comes to seamless message synchronization.
Additional Research Insights:
- Security Considerations:
The use of OrbitDB in combination with TOR ensures that data is both decentralized and encrypted. However, it is crucial to note that while this system offers strong privacy protection, performance may vary depending on network speed, particularly in regions with slower access to the TOR network. - Scalability and Usage:
Since each community is self-contained, the platform scales horizontally. However, large communities might face performance issues due to the decentralized nature of OrbitDB. Real-time message synchronization may lag compared to centralized systems like Slack, especially in high-traffic scenarios. - Potential for Adoption in High-Risk Areas:
TryQuiet is particularly attractive for teams working in high-risk areas where surveillance is a concern, such as journalism, activism, or industries handling sensitive information. The lack of a central server makes it resistant to governmental or third-party takedowns, making it a resilient choice for such teams.
5- Ricochet Refresh
Ricochet Refresh is a minimalist, one-to-one messaging application built for users who prioritize privacy and anonymity. All communication in Ricochet Refresh is routed through the TOR v3 network, providing a high level of protection from surveillance and censorship. Developed in C++, Ricochet Refresh is open source, allowing the community to inspect and contribute to its development.
Key Technical Features:
- TOR v3 Network Integration:
Ricochet Refresh utilizes the TOR v3 protocol, which offers stronger cryptographic guarantees than the older versions. TOR v3 uses elliptic curve cryptography and provides better protection against deanonymization attacks. All messages are routed through multiple encrypted nodes, ensuring that both the sender and recipient’s locations remain hidden from potential adversaries. - Ricochet ID System:
Instead of traditional usernames or phone numbers, Ricochet assigns users a Ricochet ID, a random string that serves as the only identifier for a user. This ID is used for adding contacts and communicating with them. The lack of personal information, such as email or phone number, contributes to maintaining a high level of anonymity. - Simplicity and Ease of Use:
Ricochet Refresh boasts a minimalist interface with only the essential messaging features. There are no options for group chats, communities, or additional functionalities often found in modern messaging apps. This simplicity appeals to users who want to keep things basic and distraction-free while ensuring their communications are private. - Cross-Platform Support:
The app is available for Linux, macOS, and Windows, making it accessible to users across different operating systems. The installation process is straightforward, requiring minimal setup, which is a significant advantage for users not experienced with complex software configurations. - Open Source:
Ricochet Refresh’s open-source nature means that anyone can inspect its code, contribute to its development, or create a fork for their own purposes. This transparency is key to building trust within the privacy-conscious community. The code is hosted on GitHub, allowing users to stay informed about updates and potential vulnerabilities.
Pros:
- TOR v3 for Anonymity:
The use of TOR v3 ensures strong encryption and protection of user identities. The v3 protocol enhances security and resilience against network-based attacks, offering better privacy than older versions of TOR or centralized messaging apps. - Minimalist and Simple UI:
Ricochet Refresh provides a no-frills user interface, focusing on the core function of one-to-one messaging. Users who appreciate simplicity and ease of use will find it intuitive and straightforward. - Cross-Platform Compatibility:
The app runs smoothly on Linux, macOS, and Windows, giving users the flexibility to communicate privately across different systems. - Open Source Development:
Being open source, Ricochet Refresh allows users to verify its security claims by inspecting the source code. This also enables community contributions and independent audits, which are essential for maintaining privacy tools.
Cons:
- No Security Guarantee:
Despite using TOR, there is no official security guarantee provided by the developers of Ricochet Refresh. The absence of a formal audit or security guarantee leaves users to trust the open-source community or conduct their own evaluations. This could be a concern for individuals or organizations seeking a more robust security assurance. - Limited Features:
Ricochet Refresh lacks many of the advanced features found in modern messaging apps. It does not support group chats, community creation, or even media file sharing. While this minimalism may appeal to some users, it limits its practicality for teams or individuals who need more functionality from their communication tools.
6- Speek
Speek transmits messages securely using end-to-end encryption. It is very similar in UI design to a telegram. The Speek client creates a Tor hidden service on the user’s computer and messages are routed to the recipient through the Tor onion network. This way IP addresses remain hidden and users can be anonymous.
Users use public keys to identify each other. Each user can share their public key with others to add them to their contact list. This structure provides both anonymity and secure communication.
Key Technical Features:
- Tor Hidden Service Integration:
Speek operates by creating a Tor hidden service directly on the user’s device. This service enables secure routing of messages through the Tor onion network, ensuring that IP addresses remain concealed, and no third party can track the sender or recipient. This architecture protects users from network surveillance, making it difficult to trace the origin or destination of the communication. - Public Key Cryptography for Identification:
Users in Speek are identified by their public keys, which serve as their unique identifier. Instead of traditional usernames or phone numbers, a user shares their public key to connect with others. This adds an additional layer of security and anonymity, as no personally identifiable information is required. The key pairs are used to establish secure communication channels between users. - End-to-End Encryption:
Speek uses end-to-end encryption to ensure that messages are securely transmitted and can only be decrypted by the intended recipient. Even if a third party intercepts the message, it would be incomprehensible without the decryption key, making this communication method highly secure. Additionally, since Speek doesn’t rely on centralized servers, it avoids common vulnerabilities found in server-based architectures. - No Centralized Server:
Speek operates without a central server, which is a major advantage in terms of privacy. Centralized servers are often targets for hackers and are subject to subpoenas or government requests for data. Since Speek uses peer-to-peer communication over the Tor network, there is no central entity holding user data, reducing the risk of mass data collection or breaches. - Cross-Platform Support with Limitations:
Speek is designed to be cross-platform, offering support for Linux, macOS, and Windows, though it currently faces compatibility issues with newer versions of Android. Despite being available on various platforms, the experience may vary due to bugs and update delays on some operating systems. - Open Source:
Speek is open source, allowing the community to audit its code for security vulnerabilities or implement improvements. This transparency is crucial for a privacy-focused tool, as it builds trust and allows users to verify that the app is adhering to its promises of privacy and security.
Pros:
- No Metadata Collection:
Unlike many other messaging apps, Speek ensures that no metadata (such as timestamps, message origin, or IP addresses) is stored or shared. This significantly enhances user privacy, as even if messages are intercepted, no contextual information can be derived from the metadata. - No Phone Number Requirement:
Speek doesn’t require a phone number, email, or other personal identifiers for registration. This is a huge privacy advantage, as users can maintain complete anonymity and are not tied to any personal information that could be used to track them. - Decentralized and Serverless:
Speek operates entirely without a central server, meaning there is no single point of failure. Users’ messages are routed through Tor’s distributed network, and no organization or server holds control over the user’s data. - End-to-End Encryption:
All communications in Speek are encrypted from sender to recipient, ensuring that only the intended recipient can decrypt and read the messages.
Cons:
- Android Compatibility Issues:
Speek currently struggles with incompatibility on newer Android versions. This limits its accessibility for mobile users, especially as Android is one of the most popular platforms for messaging apps. - Windows Loading Errors:
Some users report issues when running Speek on Windows, including loading errors that affect usability. These errors can disrupt the user experience, especially for those who rely on Windows as their primary operating system. - Low Update Frequency:
The app’s update cycle is slow, which can lead to security concerns, as vulnerabilities or bugs may take longer to be patched. In an environment where messaging security is paramount, a lack of frequent updates can be seen as a disadvantage.
7- Signal
Signal is a messaging application that works with end-to-end encryption (E2EE). Messages sent can only be read by the recipient and encryption keys are generated on user devices, which increases the security of messages. Signal uses users’ phone numbers for authentication, but with an update coming in 2024, usernames were added, which allows communication without sharing phone numbers.
In addition, it includes a “disappearing messages” feature, where messages can be automatically deleted after a set period of time. It is noted that Signal only stores technical data on centralized servers and does not provide access to message content.
Key Technical Features:
- End-to-End Encryption (E2EE):
Signal’s encryption ensures that only the sender and recipient have access to the message content. Encryption keys are generated and stored on user devices, further enhancing security. This also extends to calls and file sharing, providing comprehensive protection for all communication. - Username Update (2024):
Historically, Signal required users to register with a phone number, but with the 2024 update, the platform introduced usernames, allowing users to communicate without sharing their phone numbers. This is a major step toward improving anonymity, as users can now communicate with others without exposing their personal contact information. - Disappearing Messages:
Signal offers a disappearing messages feature, where messages can be automatically deleted after a predefined time. This adds an extra layer of privacy by ensuring that sensitive conversations are not stored on devices for extended periods, reducing the risk of later exposure. - Open Source and Community Auditing:
Signal’s open-source nature allows the global community to audit its code, ensuring transparency and enabling independent security reviews. This transparency is a major advantage for privacy-conscious users who want to verify the security of the platform themselves. - Minimal Data Collection:
Signal is designed to collect as little user data as possible. It only stores technical metadata (such as timestamps), and no message content is ever saved on Signal’s centralized servers. This approach ensures that even in the event of a server compromise, no user messages could be accessed.
Pros:
- E2EE for All Communication:
All messages, voice calls, video calls, and file transfers on Signal are end-to-end encrypted. This ensures that only the participants in the conversation can view or listen to the contents, and no third party, including Signal, has access to the encryption keys. - Username-Based Communication:
With the 2024 introduction of usernames, users can now communicate without revealing their phone numbers. This is a significant privacy upgrade, especially for users who want to remain anonymous or avoid exposing personal contact details. - Disappearing Messages:
The ability to set messages to disappear after a set time provides users with an additional layer of control over their data, helping to maintain privacy by automatically clearing sensitive conversations. - Open Source and Audited:
Signal’s open-source nature allows for independent auditing of its codebase. This level of transparency ensures that security vulnerabilities can be quickly identified and addressed by the community. - Minimal User Data Stored:
Signal does not store any message content on its servers, significantly reducing the risk of sensitive information being accessed in the event of a server compromise.
Cons:
- Phone Number Requirement (Historical):
Despite the username update, Signal still requires a phone number for initial registration. For users who prioritize anonymity, this can be a drawback, as it requires tying the app to a personal identifier. However, once registered, users can use usernames for future communication without sharing their phone numbers. - Vulnerabilities in the Past:
Signal has faced a couple of notable security vulnerabilities in its desktop application:- CVE-2019-17192: This vulnerability involved an issue with file encryption in the desktop app, where an attacker could potentially exploit a weakness in how files were handled during encryption. The issue was addressed in subsequent updates.
- CVE-2023-24068: A vulnerability was found that could allow the circumvention of some security controls within the app, which was patched by the Signal development team to restore the platform’s integrity.
- Reliance on Centralized Servers:
Signal’s architecture still relies on centralized servers to facilitate message routing, albeit in an encrypted form. While message content is never stored on these servers, the reliance on a centralized infrastructure could be seen as a potential risk, especially in scenarios where government or legal pressures might attempt to interfere with these servers. - Lack of Advanced Features:
Compared to other messaging platforms like Telegram or WhatsApp, Signal offers a more minimal feature set. For example, Signal does not have as many advanced functionalities for large group chats, file sharing, or media management, which may be a limitation for users looking for an all-in-one communication platform.
We have reviewed 7 different messaging applications together, you can choose your new telegram alternative application by paying attention to its positive and negative features according to your own needs.