session-android
session-desktop
session-android | session-desktop | |
---|---|---|
174 | 301 | |
1,693 | 1,415 | |
3.8% | 2.2% | |
9.5 | 0.0 | |
1 day ago | 5 days ago | |
Java | TypeScript | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
session-android
- Signal: Keep your phone number private with Signal usernames
-
What are you shocked people are still doing nowadays?
Other alternatives include Session (free) and Threema (paid - 5€).
-
Tyranny Censorship? No problem, Self-custody your content distribution
Test it by downloading session at getsession.org and DM the bot by starting a new message and sending it to “Simple” (without quotes)
- Launching Default End-to-End Encryption on Messenger
- Which communication App is most secure / anonymous?
-
Official/Unofficial Monero Session Community Hangout?
Figured there should be moves to set one up if not - https://getsession.org/
- Session: Send Messages, Not Metadata
-
Signal: The Pqxdh Key Agreement Protocol
* marketing "Perfect Forward Secrecy" AKA "Forward Secrecy"[0].
I favor Session Private Messenger[1] because it is decentralized and allows third party clients, but Signal enthusiasts warn me that the Session client may, hypothetically, at some future date, integrate a cryptocurrency, as the Signal client already does[2].
[0] https://en.wikipedia.org/wiki/Forward_secrecy
[1] https://getsession.org
[2] https://www.stephendiehl.com/blog/signal.html
-
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
If you have a mobile phone number, the domestic intelligence agency knows exactly where you are at all times and any LEO (without a warrant) can also find you. In addition, there have been numerous CCC presentations showing how insecure the global (excluding US) and (separately) US carriers are guilty of promiscuous metadata trafficking ($$) and insecure SS7 setups. As a consequence, for low $, you can go to any one of several shady websites and find the last location of almost any phone number (person unique ID) globally. There are additional varying exploitable vulnerabilities depending on the exact combination of {handset x carrier x country} to impersonate them, tap their line, reveal their exact location, and redirect their phone number through a third-party handset or even a PBX. These are more expensive and some capabilities are forbidden for all but a few selective intelligence uses.
Session (Signal fork) doesn't use phone numbers. It's pretty well-designed overall and uses an onion routing approach. It's already a superset of Signal except it doesn't use phone numbers. https://getsession.org
Also look interesting:
* (unproven) https://www.olvid.io/technology
* (unproven) https://simplex.chat
PS: Using regular TOR on home broadband or cloud servers is relatively risky and inefficient. Sybil attacks on it are common. And to network operators and security agencies it gives an easy "flow tag" of your uplink and exit node data traffic as automatically suspicious.
- E2EE messenger for who want absolute privacy and freedom from any surveillance
session-desktop
-
How does SonoBus compares to Signal with regards to encryption, quality and latency?
https://github.com/oxen-io/session-android https://github.com/oxen-io/session-desktop https://github.com/oxen-io/session-ios
-
"message deleted" prompt still appears after months
This is the correct place to raise feature requests and bug reports: https://github.com/oxen-io/session-desktop/issues
-
session wont connect. is anyone else having issues?
We're at 1.10.8. Please update: https://github.com/oxen-io/session-desktop/releases
- Multiple accounts on session?
-
Signal impersonation risk?
Session's reasoning seems much more... cagey. Telling people to recreate their identities themselves sounds a little like the Threema stopgap solution, but it's much sloppier (I can't imagine end users WANT to recreate their account and communicate this to all their contacts via a third party). They're talking about implementing this eventually, but the ticket for doing so was closed right after saying this.
- Session: ISP can tell when you use the messenger, right?
-
⟳ 6 apps added, 93 updated at f-droid.org
Session F-Droid (version 1.15.4): Encrypted private messenger
- PGP ile elinizde bulundurduğunuz gizli lozan anlaşmalarını (dosya veya metin, ikisi de olur) şifreleyebilirsiniz. Resimdeki dosyanın şifresinin kırılabilmesi için en az 20 yıl gerekiyor (bu da en az, 20 yıldan fazla bile olabilir) Bu programın ne işe yarayabileceğini yoruma attım. (Kaydırgaçlı post)
- Iranian here responding to the signal post: clarifying the internet situation in Iran
-
Help people in Iran reconnect to Signal
Or Briar, Session, Tox, Element/Matrix, Jami...
What are some alternatives?
simplex-chat - SimpleX - the first messaging network operating without user identifiers of any kind - 100% private by design! iOS, Android and desktop apps 📱!
Tox - The future of online communications.
berty - Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
qTox - qTox is a chat, voice, video, and file transfer IM client using the encrypted peer-to-peer Tox protocol.
session-open-group-server
jami-cli - Jami client for terminal
loki-network - Lokinet is an anonymous, decentralized and IP based overlay network for the internet.
lokinet-gui - GUI Control panel for Lokinet built using electron
Signal-Desktop - A private messenger for Windows, macOS, and Linux.
µWebSockets - Simple, secure & standards compliant web server for the most demanding of applications
Speek - Privacy focused messenger that doesn't trust anyone with your identity, your contact list, or your communications