Table of Contents

Рекомендованные программные решения

General security recommendations can be found here. This page briefly describes our recommended software solutions.

Recommended P2P and Hybrid Solutions

P2P, Hybrid

TOX.

on wikipedia

A program for messaging, audio, video calling, and transferring files. (Equivalent to Skype) Advantages:

Disadvantages as of 2018.05:

Basic use:

  1. Send your public key to a companion, which can be found in program settings after launch.
  2. Add your companion's public key to the program by pressing the “Add New Contact” button.
  3. Enjoy.

Directory:

bitmessage.

on wikipedia

A program for text messaging. (Equivalent to Email). Advantages:

Disadvantages as of 2018.05:

Principle of the program:

  1. Alice wants to send a message to Bob.
  2. Alice encrypts the message using Bob's public key, then saves it in a local database.
  3. Alice sends her database to all network users with whom she is currently connected.
  4. Bob receives a new database from each user that he is connected with.
  5. Bob tries to decrypt each new message from the database using his private keys, and if the new message is not meant for him, then “Bob” will not be able to decrypt it.
  6. Bob successfully decrypts the message sent by Alice, which is located in one of the versions of the database, received by one of the network users.

Basic use:

  1. Generate at least one (key pair).
  2. Send the public key to your companion (after that, they will be able to send you messages).
  3. Add your companion's public key (after that, you will be able to send them messages).
  4. Enjoy.
  5. If the program creates a heavy load on your computer, you can try limiting the connection speed in the program to a value less than 100 KB.

Directory:

RetroShare

on github

This project resembles a kind of social platform (as opposed to social networks). It works on the principle of f2f, however, at the moment it is more of an f2f and p2p hybrid, since most users do not follow strict f2f principles when using RetroShare. List of main features of the program:

Advantages:

Disadvantages as of 2018.05:

Basic use:

  1. Run the program and follow the setup wizard's instructions.
  2. Send your public key to a companion.
  3. Add your companion's public key via the add contact wizard.
  4. Enjoy.

Links:

Acceptable Centralized Program Solutions

about program solutions type Solutions in this category oftentimes fail to provide a solid level of privacy and security, but if you need to use this type of solution, we have compiled a list of the best solutions from this category below.

XMPP (Jabber)

on wikipedia

A protocol used to exchange files and text messages (in some client programs you can also make audio/video calls). Advantages:

Disadvantages as of 2018.05:

Basics of using client programs:

  1. Register. Registration may vary in complexity and the amount of data required depending on the server. In the best case, just click the “register” button in the client program after typing the address of the selected server and the name of the account, and if the server supports registration this way, and the chosen name is available, then you will be registered immediately and will be able to use jabber. However, more and more servers are requiring web registration (via web browser) and a lot of personal data.
  2. Send a companion your jid (jabber id), which servers as a user ID in the jabber network and appears in the form of user@server (like an e-mail address).
  3. Add your companion's jid to your client program.
  4. Enjoy.

Recommended client programs:

Recommended server programs:

Mumble

A voice-conference program that is presented as a program for gamers, but goes far beyond this framework. Advantages:

Disadvantages as of 2018.05:

Basics of using the client program:

  1. Go through the initial sound configuration wizard and generate a client certificate.
  2. Add the server that you want to use.
  3. Connect to the chosen server. When connecting, enter the password if the server requires one (the password must be provided by the server administrator).
  4. Enjoy.

Directory:

Additional Security and Privacy Tools

PGP

on wikipedia

One of the first program solutions for e2e encryption was originally developed only for email, but is now widely used in other areas such as instant messaging and file encryption for transmission over insecure communication channels. Unfortunately there is no single way to use pgp for all data transmitted over the internet, there are add-ons/extensions for work programs with email, and some instant messaging programs support pgp. Advantages:

Disadvantages:

Principle of operation:

  1. You generate a key pair.
  2. You send a public key to a user that wants to safely send you data.
  3. You add the public key of the user you would like to send data to.
  4. You encrypt data for the user with a public key.
  5. You send encrypted data to the user through any available (including unsafe) communication channel.
  6. The user decrypts the data with their own private key from the same pair.

Directory:

7Zip

An archiver-compressor of files and directories. It is able to use symmetric encryption with a password.Advantages:

Disadvantages:

Method of application:

  1. You create a password-protected archive with encryption enabled.
  2. You send an encrypted archive via any communication channel (including insecure ones).
  3. You send the user the password to the archive via a secure communication channel.
  4. The recipient decrypts the data.

Directory: