![]() Step 3: Right click on myself icon of TorChat contact list and copy ID to clipboard.Step 2: Edit the TorChat configuration file /torchat/bin/Tor/torrc.txt:.Step 1: Put the OnionPhone folder on the hard disk, removable media or TrueCrypt container (preferred).Installation The easiest way is to use OnionPhone as a VOIP plugin for TorChat: The build for Android and crossplatform library style with minimal necessary API are in plans now. can be compiled under Linux OS (Debian, Ubuntu etc.) using GCC or under Win32 OS (from Windows 98 up to 8) using MinGW.is statically linked, does not require additional third-party libraries and uses a minimum of system functions. ![]() is fully open source, developed on pure C at the possible lowest level and carefully commented.uses command-line style, does not require installation and can be run from removable disk or TrueCrypt container.Radio mode (Push to Talk) and voice control mode (Voice Active Detector with generation a short signal when transmission is completed) are available.Īre available control interfaces (UI) using Telnet and WebSocket (HTML5 GUI on JavaScript using a web-browser).Ĭrossplatform Qt GUI TorChat + OninPhone + H.264 video is in plans now. Specially designed dynamic adaptive buffer useful for smart jitter compensation in high latency Onion environment. Built-in LPC vocoder featuring irreversible voice chage (robot, whisper etc.). Some of them are free but some require a license (check regional laws).Īdditional features: implemented noise suppressors (NPP7 and SPEEX) of environment sounds and automatic mic gain control. OnionPhone can use a wide range of built-in voice codecs (C source included) from ultra low-bitrates up to high quality. Onion Phone provides Perfect Forward Secrecy (uses a fresh key for each call) and Full Deniability for using long-term public keys of participants (as a fact and a content of the conversation): like a deniable SKEME protocol uses for initial key exchange. using a long-term public keys signed by PGP.using previously shared password (with the possibility of hidden notification under enforcement).Other possible ways of multifactor authentication are: Also the recipient can verify identity of the originator's Onion address (only with the permission of the sender) similarly to the TorChat authentication. In the case of a call to the Onion address Tor protects against MitM attacks. OnionPhone provides independent level of p2p encryption and authentication that uses modern cryptographic primitives: Diffie-Hellmann key exchange with Elliptic Curve 25519 and Keccak Sponge Duplexing encryption. ![]() OnionPhone uses a custom UDP/TCP protocol (not RTP) with only one byte unencrypted header that can provide some obfuscation against DPI. In addition, OnionPhone can establish a direct UDP or TCP connection to the specified port on IP-address or host. The ability to switch to a direct UDP connection (with NAT traversal) after the connection is established over Tor ( Tor instead of SIP without a specialized server, any registration or metadata collection) is also provided. The recipient can initialize a reverse Onion connection to the originator's HS and use a faster channel periodically resetting the slower channel to reduce overall latency. Call is targeted by the Onion address of the recipient (its hidden service HS). OnionPhone is a VOIP tool for calling over Tor networ which can be used as a VOIP plugin for TorChat.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |