


Features that are not related to the core networking system are left up to the client. Group messaging, voice and video conferencing.Īdditional features can be implemented by any client, so long as they are supported by the core protocol.Making your identity impossible to forge without the possession of your personal private key, which never leaves your computerĪs of late-2018, the following secure (encrypted) features have been implemented:.Enforcing end-to-end encryption with perfect forward secrecy as the default and only mode of operation for all messages.Removing the need to rely on central authorities to provide messenger services.Everything is encrypted using the NaCl crypto library, via libsodium. Users can message friends, join public/private chat rooms and send each other large files. Users can optionally create a vanity address using a DNS directory that maps ID hashes to human usable addresses (though no strong guarantees against spoofing are possible). In the Tox design, your public key is your Tox ID, which is looked up in the DHT network. Desktop versions are available for every major OS, however mobile support is lacking. However, Tox is the only Tor compatible VoIP solution we know of, allowing communication with others even if they are not anonymous. By default, Tox does not attempt to cloak your IP address from authorized contacts. The official client implementation is based on the TokTok protocol library, which is very feature-rich and has a variety of functions besides VoIP.
#QTOX SECURITY SOFTWARE#
Tox looks like a promising solution for secure, encrypted communications. If you like our list of qTox alternatives and similar software in 2022, then please rate us below.
