Loading AI tools
Distributed protocol for telephony and instant messaging From Wikipedia, the free encyclopedia
Tox is a peer-to-peer instant-messaging and video-calling protocol that offers end-to-end encryption. The stated goal of the project is to provide secure yet easily accessible communication for everyone.[2] A reference implementation of the protocol is published as free and open-source software under the terms of the GNU GPL-3.0-or-later.
Stable release | 0.2.19
/ 28 March 2024[1] |
---|---|
Repository | |
Written in | C |
Operating system | Linux, OS X, Windows, Android, iOS, FreeBSD, OpenIndiana, Sailfish OS |
Type | VoIP, Instant messaging, Videoconferencing |
License | GPL-3.0-or-later. |
Website | tox |
An idea of developing a secure peer-to-peer messenger which would later turn into Tox sparked on the anonymous imageboard 4chan[3] amidst the allegations that Skype provided the NSA with access to their infrastructure and encryption, just before they were bought by Microsoft.[4][5]
The initial commit to GitHub was pushed on June 23, 2013, by a user named irungentoo.[6] Unofficial community builds became available as early as on August 23, 2013,[7] with the first official builds made available in October 2013.[8] On July 12, 2014, Tox entered an alpha stage in development and a redesigned download page was created for the occasion.[9]
During the first two years of its life, the project's business and monetary side was handled by Tox Foundation, a California-registered corporation.[10] On July 6, 2015 an issue was open on the project's GitHub, where a third party stated[11] that Tox Foundation's sole board member, Sean Qureshi, used an amount of money in the thousands of US dollars to pay for their college tuition,[12] with those funds coming from Tox Foundation's participation in Google Summer of Code. When asked for additional clarification, irungentoo, on behalf of the project's team, confirmed the allegations.[13] On July 11, 2015 the project's infrastructure and repositories were moved to a new locations, due to the fact that Qureshi controlled the original project's domains and servers. In the project's blog the development team has announced their "disassociation" with Tox Foundation and Qureshi in particular, and further addressed the issue.[14] This situation caused many prominent contributors to cease Tox-related activity.[15]
Sometime during 2016, the original reference implementation saw a steady decline in development activity,[16] with the last known commit currently dated Oct 2018.[17] This caused the project to split, with those interested in continuing the development creating a new fork of Tox core[18] called "c-toxcore" around the end of September 2016.
Currently c-toxcore is being developed by a collective known as the TokTok Project.[19] They describe their mission as "to promote universal freedom of expression and to preserve unrestricted information exchange".[20] Their current goals are to continue slow iterative development of the existing core implementation, along with in-parallel development of a new reference implementation in Rust.[19][21]
Initially, the Rust implementation of the protocol library was split in two halves, one handling most of the grunt work of communication with the network, and another one responsible specifically for bootstrap node operation. In December 2022 those were merged, with developers stating that code was now mature enough to support basic communication and bootstrap node operations using TCP connections. As of June 2023 the development is still ongoing, but no client implementations using Rust core library is available yet.[21]
Although the original core library implementation and its forks have been available for the general public for almost a decade, none of them have been reviewed by a competent third-party security researcher.
In 2017, WireGuard's author Jason A. Donenfeld opened an issue on the project's GitHub page[22] where he stated that c-toxcore is vulnerable to key compromise impersonation (KCI) attacks. Donenfeld attributed his find to the fact that Tox is relying on "homebrew crypto" developed by "non-experts" to facilitate handshakes. He also criticized some other design choices used by Tox developers as well, like using raw ECDH values as encryption keys.
This report has caused developers to put an additional disclaimer on the project's GitHub page,[23] stating that Tox is an experimental cryptographic network library that has not been formally audited by an independent third party that specializes in cryptography or cryptanalysis, with a separate disclaimer that users may use it on their own risk.
In March 2023, a post on the project's blog[24] stated that one of the community members is working to redesign the cryptographic mechanism used by Tox to perform handshakes using the AKE mechanisms used in the Noise Protocol Framework. This post also contains a detailed explanation of the original vulnerability.
Users are assigned a public and private key, and they connect to each other directly in a fully distributed, peer-to-peer network. Users have the ability to message friends, join chat rooms with friends or strangers, voice/video chat, and send each other files. All traffic over Tox is end-to-end encrypted using the NaCl library, which provides authenticated encryption and perfect forward secrecy.
Tox clients aim to provide support for various secure and anonymised communication features; while every client supports messaging, additional features like group messaging, voice and video calling, voice and video conferencing, typing indicators, message read-receipts, file sharing, profile encryption, and desktop streaming are supported to various degrees by mobile and desktop clients. Additional features can be implemented by any client as long as they are supported by the core protocol. Features that are not related to the core networking system are left up to the client. Client developers are strongly encouraged to adhere to the Tox Client Standard[25] in order to maintain cross-client compatibility and uphold best security practices.
Though several apps that use the Tox protocol seem similar in function to regular instant messaging apps, the lack of central servers similar to XMPP or Matrix currently has the consequence that both parties of the chat need to be online for the message to be sent and received. The Tox enabled messengers deal with this in separate ways: some prevent the user from sending the message if the other party has disconnected, while others show the message as being sent when in reality it is stored in the sender's phone waiting to be delivered when the receiving party reconnects to the network.[26]
Tox received some significant publicity in its early conceptual stage, catching the attention of global online tech news sites.[27][28][29][30] On August 15, 2013, Tox was number five on GitHub's top trending list.[31] Concerns about metadata leaks were raised, and developers responded by implementing Onion routing for the friend-finding process.[32] Tox was accepted into the Google Summer of Code as a Mentoring Organization in 2014 and 2015.[33][34]
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.