Tox (protocol)
Stable release | 0.2.19
/ 28 March 2024[1] |
---|---|
Repository | |
Written in | C |
Operating system | Linux, OS X, Windows, Android, iOS, FreeBSD, OpenIndiana, Sailfish OS |
Type | VoIP, Instant messaging, Videoconferencing |
License | GPL-3.0-or-later. |
Website | tox |
Tox is a peer-to-peer instant-messaging and video-calling protocol that offers end-to-end encryption. The stated goal of the project is to provide secure yet easily accessible communication for everyone.[2] A reference implementation of the protocol is published as free and open-source software under the terms of the GNU GPL-3.0-or-later.
History
[edit]Inception
[edit]An idea of developing a secure peer-to-peer messenger which would later turn into Tox sparked on the anonymous imageboard 4chan[3] amidst the allegations that Skype provided the NSA with access to their infrastructure and encryption, just before they were bought by Microsoft.[4][5]
The initial commit to GitHub was pushed on June 23, 2013, by a user named irungentoo.[6] Unofficial community builds became available as early as on August 23, 2013,[7] with the first official builds made available in October 2013.[8] On July 12, 2014, Tox entered an alpha stage in development and a redesigned download page was created for the occasion.[9]
Tox Foundation controversy
[edit]During the first two years of its life, the project's business and monetary side was handled by Tox Foundation, a California-registered corporation.[10] On July 6, 2015 an issue was open on the project's GitHub, where a third party stated[11] that Tox Foundation's sole board member, Sean Qureshi, used an amount of money in the thousands of US dollars to pay for their college tuition,[12] with those funds coming from Tox Foundation's participation in Google Summer of Code. When asked for additional clarification, irungentoo, on behalf of the project's team, confirmed the allegations.[13] On July 11, 2015 the project's infrastructure and repositories were moved to a new locations, due to the fact that Qureshi controlled the original project's domains and servers. In the project's blog the development team has announced their "disassociation" with Tox Foundation and Qureshi in particular, and further addressed the issue.[14] This situation caused many prominent contributors to cease Tox-related activity.[15]
Project's fork and Rust implementation
[edit]Sometime during 2016, the original reference implementation saw a steady decline in development activity,[16] with the last known commit currently dated Oct 2018.[17] This caused the project to split, with those interested in continuing the development creating a new fork of Tox core[18] called "c-toxcore" around the end of September 2016.
Currently c-toxcore is being developed by a collective known as the TokTok Project.[19] They describe their mission as "to promote universal freedom of expression and to preserve unrestricted information exchange".[20] Their current goals are to continue slow iterative development of the existing core implementation, along with in-parallel development of a new reference implementation in Rust.[19][21]
Initially, the Rust implementation of the protocol library was split in two halves, one handling most of the grunt work of communication with the network, and another one responsible specifically for bootstrap node operation. In December 2022 those were merged, with developers stating that code was now mature enough to support basic communication and bootstrap node operations using TCP connections. As of June 2023 the development is still ongoing, but no client implementations using Rust core library is available yet.[21]
Security audit and related concerns
[edit]Although the original core library implementation and its forks have been available for the general public for almost a decade, none of them have been reviewed by a competent third-party security researcher.
In 2017, WireGuard's author Jason A. Donenfeld opened an issue on the project's GitHub page[22] where he stated that c-toxcore is vulnerable to key compromise impersonation (KCI) attacks. Donenfeld attributed his find to the fact that Tox is relying on "homebrew crypto" developed by "non-experts" to facilitate handshakes. He also criticized some other design choices used by Tox developers as well, like using raw ECDH values as encryption keys.
This report has caused developers to put an additional disclaimer on the project's GitHub page,[23] stating that Tox is an experimental cryptographic network library that has not been formally audited by an independent third party that specializes in cryptography or cryptanalysis, with a separate disclaimer that users may use it on their own risk.
In March 2023, a post on the project's blog[24] stated that one of the community members is working to redesign the cryptographic mechanism used by Tox to perform handshakes using the AKE mechanisms used in the Noise Protocol Framework. This post also contains a detailed explanation of the original vulnerability.
Features
[edit]Encryption of traffic
[edit]Users are assigned a public and private key, and they connect to each other directly in a fully distributed, peer-to-peer network. Users have the ability to message friends, join chat rooms with friends or strangers, voice/video chat, and send each other files. All traffic over Tox is end-to-end encrypted using the NaCl library, which provides authenticated encryption and perfect forward secrecy.
Additional messaging features
[edit]Tox clients aim to provide support for various secure and anonymised communication features; while every client supports messaging, additional features like group messaging, voice and video calling, voice and video conferencing, typing indicators, message read-receipts, file sharing, profile encryption, and desktop streaming are supported to various degrees by mobile and desktop clients. Additional features can be implemented by any client as long as they are supported by the core protocol. Features that are not related to the core networking system are left up to the client. Client developers are strongly encouraged to adhere to the Tox Client Standard[25] in order to maintain cross-client compatibility and uphold best security practices.
Usability as an instant messenger
[edit]Though several apps that use the Tox protocol seem similar in function to regular instant messaging apps, the lack of central servers similar to XMPP or Matrix currently has the consequence that both parties of the chat need to be online for the message to be sent and received. The Tox enabled messengers deal with this in separate ways: some prevent the user from sending the message if the other party has disconnected, while others show the message as being sent when in reality it is stored in the sender's phone waiting to be delivered when the receiving party reconnects to the network.[26]
Reception
[edit]Tox received some significant publicity in its early conceptual stage, catching the attention of global online tech news sites.[27][28][29][30] On August 15, 2013, Tox was number five on GitHub's top trending list.[31] Concerns about metadata leaks were raised, and developers responded by implementing Onion routing for the friend-finding process.[32] Tox was accepted into the Google Summer of Code as a Mentoring Organization in 2014 and 2015.[33][34]
See also
[edit]- Comparison of instant messaging clients
- Comparison of instant messaging protocols
- Comparison of VoIP software
- List of free and open-source software packages
References
[edit]- ^ "Release v0.2.19 · TokTok/c-toxcore". TokTok Project. 2024-03-28. Retrieved 2024-08-26.
- ^ "Secure Messaging for Everyone". Tox. Retrieved 6 August 2015.
- ^ "Daily reminder that Skype reads the URLs you send, your browser profile, sends encrypted data to Microsoft data centers and gives your conversations to the NSA". 4chan (mirrored). 2013-06-23.
- ^ Bogdan Popa (20 June 2013). "Skype Provided Backdoor Access to the NSA Before Microsoft Takeover (NYT)". Softpedia.
- ^ Bogdan Popa (31 December 2014). "Leaked Documents Show the NSA Had Full Access to Skype Chats". Softpedia.
- ^ "Initial commit". GitHub. Retrieved 18 February 2014.
- ^ "Binaries - Tox". 2013-08-23. Archived from the original on 2013-10-04.
- ^ "Binaries - Tox". 2013-10-04. Archived from the original on 2013-10-04.
- ^ "Binaries - Tox". 2014-08-09. Archived from the original on 2014-08-09.
- ^ "Tox Foundation - BusinessesCalifornia". www.businessescalifornia.com. Archived from the original on 2016-03-21.
- ^ "Current situation of Tox · Issue #1379 · irungentoo/toxcore". GitHub. Retrieved 2023-05-20.
- ^ "Current situation of Tox · Issue #1379 · irungentoo/toxcore". GitHub. Retrieved 2023-05-20.
- ^ "Current situation of Tox · Issue #1379 · irungentoo/toxcore". GitHub. Retrieved 2023-05-20.
- ^ "Current Situation – Tox Blog". 2015-07-11. Retrieved 2023-05-20.
- ^ "A split within the Tox project". LWN.net. Nathan Willis. 15 July 2015. Retrieved 14 February 2016.
- ^ "Commits · irungentoo/toxcore". GitHub. Retrieved 2023-05-18.
- ^ "Fix memory leak when closing TCP connection. · irungentoo/toxcore@bf69b54". GitHub. Retrieved 2023-05-20.
- ^ "Commits · TokTok/c-toxcore". GitHub. Retrieved 2023-05-18.
- ^ a b "The TokTok Project - Home". toktok.ltd. Retrieved 2023-05-18.
- ^ "The TokTok Project - Mission". toktok.ltd. Retrieved 2023-05-18.
- ^ a b Tox, tox-rs, 2023-05-08, retrieved 2023-05-18
- ^ "Tox Handshake Vulnerable to KCI · Issue #426 · TokTok/c-toxcore". GitHub. Retrieved 2023-05-20.
- ^ TokTok/c-toxcore, TokTok Project, 2023-05-18, retrieved 2023-05-20
- ^ "Redesign of Tox's Cryptographic Handshake – Tox Blog". 2023-03-02. Retrieved 2023-05-20.
- ^ "Tox Client Standard". Retrieved 7 November 2015.
- ^ "users:troubleshooting - Tox Wiki". wiki.tox.chat. Retrieved 2019-04-26.
- ^ Kar, Saroj (5 August 2013). "Tox: A Replacement For Skype And Your Privacy?". Silicon Angle. Retrieved 19 February 2014.
- ^ Grüner, Sebastian (30 July 2013). "Skype-Alternative Freier und sicherer Videochat mit Tox" [More free and secure video chat with Tox]. Golem.de (in German). Retrieved 19 February 2014.
- ^ "Проект Tox развивает свободную альтернативу Skype" [Tox project develops free Skype replacement]. opennet.ru (in Russian). 30 July 2013. Retrieved 19 February 2014.
- ^ Nitschke, Manuel (2 August 2013). "Skype-Alternative Tox zum Ausprobieren" [Tox Skype replacement tested]. heise.de (in German). Retrieved 19 February 2014.
- ^ Asay, Matt (15 August 2013). "GitHub's new 'Trending' Feature Lets You See The Future". ReadWrite.com. Retrieved 19 February 2014.
- ^ "Prevent_Tracking.txt". GitHub. Retrieved 20 February 2014.
- ^ "Project Tox". GSoC 2014. Retrieved 7 March 2015.
- ^ "Project Tox". GSoC 2015. Retrieved 7 March 2015.
External links
[edit]- 2013 software
- Android (operating system) software
- Communication software
- Cross-platform software
- Distributed computing
- Free communication software
- Free instant messaging clients
- Free software programmed in C
- Instant messaging clients
- Instant messaging clients for Linux
- Instant messaging clients that use GTK
- IOS software
- MacOS instant messaging clients
- Onion routing
- Peer-to-peer
- Secure communication
- Videotelephony
- VoIP protocols
- VoIP software
- Windows instant messaging clients