![]() TFC also features a traffic masking mode that hides the type, quantity, and schedule ofĬommunication, even if the network facing device of the user is hacked. At the same time it makes the communication censorship resistant: Blocking TFC requires blocking Tor categorically, nation-wide. Protected geolocation makes physical attacks very difficult because the attacker doesn’t know where the device is located on the planet. By knowing this TFC account, anyone can send the user a contact request and talk to them without ever learning their real life identity, IP-address, or geolocation. 4sci35xrhp2d45gbm3qpta7ogfedonuw2mucmc36jxemucd7fmgzj3ad. During the first launch TFC generates a random TFC account (an Onion Service address) for the user, e.g. Using Onion Services also means no account registration is needed. All data is always encrypted with keys the user controls, and the There are no ads or tracking, and it collects no data whatsoeverĪbout the user. The network architecture means TFC runs exclusively Messengers, there’s no third party server with access to user metadata such as who is It also means that unlike (de)centralized Users to accidentally deanonymize themselves. To enable P2P communication that never exits the Tor network. ![]() TFC routes all communication exclusively through theĪnonymity network. Key generation of TFC relies on Linux kernel’s The parameters of which are automatically tuned according to best Of which is derived from password and salt using TFC provides per-messageĪll persistent user data is encrypted locally using XChaCha20-Poly1305, the key Of which are verified via an out-of-band channel. To protect all messages and files sent to individual recipients and groups. XChaCha20– Poly1305 end-to-end encryption TFC is designed for people with one of the most complex threat models: organized crime groups and nation state hackers who bypass end-to-end encryption of traditional secure messaging apps by hacking the endpoint. Tinfoil Chat (TFC) is a FOSS+ FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from passive collection, MITM attacks and most importantly, remote key exfiltration.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |