Octodon
#ricochet

une messagerie instantané peer-to-peer construit sur les services cachés de Tor 👉 reallysecuretools.livehost.fr/

Instrucciones para compilar #ricochet desde las fuentes, por si a alguien le interesa:
https://github.com/ricochet-im/ricochet/blob/master/BUILDING.md
@juansantiago En mi caso tengo un /usr/bin/ricochet si bien a la hora de instalarlo hay que distinguir #ricochet (un juego) de #ricochet-im (el cliente de mensajería). ¡Por lo demás es realmente minimalista y funcional! :)
#Ricochet is a #decentralized instant messenger, meaning there is no server to connect to and share #metadata with. Further, using #Tor, Ricochet starts a Tor hidden service locally on a person's computer and can communicate only with other Ricochet users who are also running their own Ricochet-created Tor hidden services. This way, Ricochet communication never leaves the Tor network.

https://en.wikipedia.org/wiki/Ricochet_%28software%29
[..] His chat app, called #Ricochet, builds on a feature of the anonymity software Tor that’s rendered sites on the dark web untraceable and anonymous for years. But instead of cloaking web destinations, Ricochet applies those stealth features to your PC: It turns your computer into a piece of the darknet. And unlike almost all other messaging apps, Ricochet allows conversations to travel from the sender’s computer to the recipient’s without ever passing through a central server that can track the data or metadata of users’ communications. “There’s no record in the cloud somewhere that you ever used it,” Brooks says. “It’s all mixed in with everything else happening in Tor. You’re invisible among the crowd.” And when invisibility is an option, plain old #encryption starts to feel awfully revealing. —­Andy Greenberg »



via https://www.wired.com/2017/04/20-people-creating-future-next-list-2017/
#Ricochet

«Thanks to messaging services like WhatsApp, Signal, and Apple’s iMessage, end-to-end #encryption isn’t just for spies and cypherpunks anymore; it’s become nearly as standard as emoji. But sometimes an unbroken channel of encryption between sender and receiver isn’t enough. Sure, it hides the content of messages, but it doesn’t conceal the identities of who’s writing to whom—metadata that can reveal, say, the membership of an organization or a journalist’s web of sources. John Brooks, a 25-year-old middle school dropout, has created an app that may represent the next generation of secret-sharing tools: ones that promise to hide not just your words but also the social graph of your connections. [..] (1/2)