Our valued sponsor

Alternative to Signal and TG ?

turmpy

Mentor Group Lifetime
Mar 26, 2024
81
39
43
I urgent need a good and userfriendly alternative to Skype, so I found this thread in mentor group, which is insane good for an anonymous temporary soultion for TG

however, it does not work long term, so I looked into Signal which also is suggested in this thread, STOP requires smartphone.

Isn't there anything good there except Teams that work like skype but does not require smartphone?
 
  • Like
Reactions: sebastian
Skype is a living fossil. Get a burner phone number if you don't want to expose your phone number.

There are alternatives but you'll probably find yourself quite lonely. The most popular messaging apps these days are smartphone based. You can use Session, Briar, Matrix.org (Element), SimpleX, XMPP Jabber, and so on... But what's the point unless most of your contacts are also there?

Maybe Discord? It's a very different app than Skype since it's mainly focused on larger channels/groups. Lots families, friend groups, and communities use Discord as a messaging app. But you could use it just for direct messages and group chats.

Slack and Guilded are similar to Discord but less popular for this use case.
 
  • Like
Reactions: ilke
We recently had a good discussion here:

I think Session and SimpleX are quite good for privacy.
 
I urgent need a good and userfriendly alternative to Skype, so I found this thread in mentor group, which is insane good for an anonymous temporary soultion for TG

however, it does not work long term, so I looked into Signal which also is suggested in this thread, STOP requires smartphone.

Isn't there anything good there except Teams that work like skype but does not require smartphone?
Article author here.

It actually does work long term I can confirm from personal experience. There is zero issues with this setup as you hold everything yourself. No need for smartphones or keeping phone numbers active which I would argue by that logic many services who rely on SMS/phone number aren't long-term. If you or anyone else sees something that is overlooked, I would be happy to hear your thoughts.

Needless to say Telegram is an awful choice for a messenger in terms of security or privacy. But if you are forced to use it... as @Sols said it matters where your friends/customers are. I also agree with his suggestion to get a burner phone if you don't want your number exposed.
We recently had a good discussion here:

I think Session and SimpleX are quite good for privacy.
In the interest of public safety and how many OCT users blindly use Session I will try to give my personal opinion on this without it derailing the topic as this is can become a really lengthy discussion.

My opinion is Session isn't good enough for privacy or security if you are looking for the very best. If you are OK with any risk might as well use imessage or android sms now powered & "secured" by Google. Just because a few people are jumping on that bandwagon it doesn't mean it is secure - another example for this is Telegram. The minute Session team started with bulls**t wordaround explanation of why you don't need Perfect Forward Secrecy (PFS) that said all you need to know about them. Refering to:
Why doesn't Session have PFS?
Simply put, Session mitigates the same risks that PFS does in other ways.

Through fully anonymous account creation, onion routing, and metadata minimisation, Session provides just as effective protection in real-world scenarios as PFS does, and in some cases even better protection.
(https://getsession.org/faq)

Instead of making sure a standard such as PFS is met, they decide to mitigate it in their own way. Let's write our own cryptography, what can go wrong? (too much information to reference, google yourself why not to do it). Who profits from PFS not being integrated? Only one entity and the hint is in this wikipedia article https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later

What is stopping Session team from having both their own solution and standard PFS? That is why this is fishy to developers, security experts etc. who understand the details of it. In all honesty the people who decide to do cryptography their own way or implement something their own way are the same type of people who say we shouldn't add quantum encryption on top of any protocol because it wouldn't be secure. Makes much logic? Nothing stops anyone (well maybe certain "harvesters of encrypted data" spreading bulls**t) from utilizing both the verified solution wrapped around the experimental one.

Session also being Australian screams major red flags as Australia has some really truly awful anti-security laws when it comes to cryptography. It is no secret Session is referred to as an inferior Signal and even a honeypot. Whether you believe that is up to you to do your own due diligence and research. I know many users here and other forums use Session but that is the facts of the matter and it is those facts that I form my opinion what to believe in or not.

SimpleX is yet to be proven. Written in Haskell which who uses? Most notably Haskell used by Meta and Wire messenger (another not so secure messenger, for history brief ref see https://medium.com/@DarKrMsg/the-rise-and-fall-of-wire-messenger-469c9c1da27f). Interesting choice of programming language and seems large project completed definitely doesn't look like a hobby project. This is only speculation of course, I'm only outlining what is written in.

My biggest issues with SimpleX are 3.

1) First one and biggest one is there are NO REPRODUCIBLE BUILDS. This means all of their source code might as well be good for nothing if you can't compile it yourself. I want to the direct everyones attention to:

Quote:
the lack of reproducible builds. While not debating the importance of reproducible builds, we offer a mitigation. Unlike many projects (including Signal and Cwtch, referenced by u/86rd9t7ofy8pguh as providing better security and privacy), we now sign release commits with the PGP key that is also published in openpgp.org, so the users can build from source and validate the code origin. While it is not a replacement to reproducible builds, it offers a mitigation for the users with higher security requirements. We will adding reproducible builds this year, it is the next priority after solving several other build problems: migration of armv7a build to the new compiler, reducing the binary size and improving some other security aspects of build and distribution process.

Remember what I said earlier in the post about people making their own cryptography, offering words workarounds of "why not" etc.? We can now add the "we offer a mitigation" to those same group of people just as easily. What is the point of open source when you can't reproduce the builds? In this way Signal are just as bad for not allowing ability to run own servers.

In the end SimpleX team might provide those builds sure but for a privacy & security project and all of this talk of security they fail to do the most simple thing for users to gain trust - verify yourself. This is why users as recent as 4 days ago have asked where are all the "simpleX is honeypot" comments are coming from
2) Second one is they seem to be doing a lot of fake marketing by claiming things like Signal can intercept messages on their website (https://simplex.chat). Reddit discussion says it pretty much how it is:


In addition I would raise it even further by claiming their table of comparisons on their website is more, lets call it "incorrect":
  1. XMPP requires phone number as "global identity"? SimpleX answer: Yes. My answer? False. Anyone can register with any server (thousands of them) for free not even email needed.
  2. XMPP depends on DNS? SimpleX answer: Yes. My answer? False. You can run it under different networks including Tor, where is the DNS there?
  3. Possibility of MITM? SimpleX answer: Yes. My answer? True and False. It is True standard XMPP can be intercepted in almost clear text however anyone using XMPP today and not in the 2000s, now uses a plugin for security. Up until some years ago that plugin was OTR and now the standard is OMEMO. OMEMO is same one used by Signal. OMEMO doesn't have the possibility of MITM.
3) SimpleX is a fairly new "thing". If 1 & 2 are resolved it would take some time and additional audits of multiple firms and individuals over a longer period to convince me personally to use it. A bonus point to this is it is heavily advertised on certain darknet forums. No wonder why people on the reddit thread I mentioned gives them "anom/encrochat" vibes.


tldr;
If you are looking for alternative that is secure, decentralized/federated then XMPP in combination with a plugin like OMEMO (which is what Signal uses) is the perfect choice. You can register at any server, setup your own server, no IDs, no phone numbers, fully open source reproducible builds, open source OMEMO plugin, battle tested.
 
Last edited:
Session is likely to be a honeypot in my opinion. For Signal users there is also the much improved Molly messaging app: https://molly.im/ which has features such as Tor Support (even via Orbot) and RAM Shredding. Still, I would personally use SimpleX over Molly.
How do you know molly or simplex aren't honeypots? Sure I can analize a million lines of code on github and compile it myself but who's gonna do that? The features it lists are at most useful if your phone is seized but if that is your thread model you shoudl be using apps like wasted or something like GrapheneOS with duress pins, disabled USB port to fight off or slow down forensics.
 
Article author here.

It actually does work long term I can confirm from personal experience. There is zero issues with this setup as you hold everything yourself. No need for smartphones or keeping phone numbers active which I would argue by that logic many services who rely on SMS/phone number aren't long-term. If you or anyone else sees something that is overlooked, I would be happy to hear your thoughts.

Needless to say Telegram is an awful choice for a messenger in terms of security or privacy. But if you are forced to use it... as @Sols said it matters where your friends/customers are. I also agree with his suggestion to get a burner phone if you don't want your number exposed.

In the interest of public safety and how many OCT users blindly use Session I will try to give my personal opinion on this without it derailing the topic as this is can become a really lengthy discussion.

My opinion is Session isn't good enough for privacy or security if you are looking for the very best. If you are OK with any risk might as well use imessage or android sms now powered & "secured" by Google. Just because a few people are jumping on that bandwagon it doesn't mean it is secure - another example for this is Telegram. The minute Session team started with bulls**t wordaround explanation of why you don't need Perfect Forward Secrecy (PFS) that said all you need to know about them. Refering to:

(https://getsession.org/faq)

Instead of making sure a standard such as PFS is met, they decide to mitigate it in their own way. Let's write our own cryptography, what can go wrong? (too much information to reference, google yourself why not to do it). Who profits from PFS not being integrated? Only one entity and the hint is in this wikipedia article https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later

What is stopping Session team from having both their own solution and standard PFS? That is why this is fishy to developers, security experts etc. who understand the details of it. In all honesty the people who decide to do cryptography their own way or implement something their own way are the same type of people who say we shouldn't add quantum encryption on top of any protocol because it wouldn't be secure. Makes much logic? Nothing stops anyone (well maybe certain "harvesters of encrypted data" spreading bulls**t) from utilizing both the verified solution wrapped around the experimental one.

Session also being Australian screams major red flags as Australia has some really truly awful anti-security laws when it comes to cryptography. It is no secret Session is referred to as an inferior Signal and even a honeypot. Whether you believe that is up to you to do your own due diligence and research. I know many users here and other forums use Session but that is the facts of the matter and it is those facts that I form my opinion what to believe in or not.

SimpleX is yet to be proven. Written in Haskell which who uses? Most notably Haskell used by Meta and Wire messenger (another not so secure messenger, for history brief ref see https://medium.com/@DarKrMsg/the-rise-and-fall-of-wire-messenger-469c9c1da27f). Interesting choice of programming language and seems large project completed definitely doesn't look like a hobby project. This is only speculation of course, I'm only outlining what is written in.

My biggest issues with SimpleX are 3.

1) First one and biggest one is there are NO REPRODUCIBLE BUILDS. This means all of their source code might as well be good for nothing if you can't compile it yourself. I want to the direct everyones attention to:

Quote:


Remember what I said earlier in the post about people making their own cryptography, offering words workarounds of "why not" etc.? We can now add the "we offer a mitigation" to those same group of people just as easily. What is the point of open source when you can't reproduce the builds? In this way Signal are just as bad for not allowing ability to run own servers.

In the end SimpleX team might provide those builds sure but for a privacy & security project and all of this talk of security they fail to do the most simple thing for users to gain trust - verify yourself. This is why users as recent as 4 days ago have asked where are all the "simpleX is honeypot" comments are coming from
2) Second one is they seem to be doing a lot of fake marketing by claiming things like Signal can intercept messages on their website (https://simplex.chat). Reddit discussion says it pretty much how it is:


In addition I would raise it even further by claiming their table of comparisons on their website is more, lets call it "incorrect":
  1. XMPP requires phone number as "global identity"? SimpleX answer: Yes. My answer? False. Anyone can register with any server (thousands of them) for free not even email needed.
  2. XMPP depends on DNS? SimpleX answer: Yes. My answer? False. You can run it under different networks including Tor, where is the DNS there?
  3. Possibility of MITM? SimpleX answer: Yes. My answer? True and False. It is True standard XMPP can be intercepted in almost clear text however anyone using XMPP today and not in the 2000s, now uses a plugin for security. Up until some years ago that plugin was OTR and now the standard is OMEMO. OMEMO is same one used by Signal. OMEMO doesn't have the possibility of MITM.
3) SimpleX is a fairly new "thing". If 1 & 2 are resolved it would take some time and additional audits of multiple firms and individuals over a longer period to convince me personally to use it. A bonus point to this is it is heavily advertised on certain darknet forums. No wonder why people on the reddit thread I mentioned gives them "anom/encrochat" vibes.


tldr;
If you are looking for alternative that is secure, decentralized/federated then XMPP in combination with a plugin like OMEMO (which is what Signal uses) is the perfect choice. You can register at any server, setup your own server, no IDs, no phone numbers, fully open source reproducible builds, open source OMEMO plugin, battle tested.
What a great read and research! Exactly what i needed... post should be made into an article
 
Session also being Australian screams major red flags as Australia has some really truly awful anti-security laws when it comes to cryptography
as far as I know there is a law in Australia which makes it illegal to notify your employers that you was instructed by the agencies to create a backdoor / an intended, deliberate bug in your employers' software / hardware.
 
as far as I know there is a law in Australia which makes it illegal to notify your employers that you was instructed by the agencies to create a backdoor / an intended, deliberate bug in your employers' software / hardware.
https://www.homeaffairs.gov.au/abou...ful-access-telecommunications/data-encryption
Engagement between Government and industry is bounded by critical safeguards. All requirements must be reasonable, proportionate, practical and technically feasible. Government cannot:
  • build or implement so-called ‘backdoors’ or do anything that would make the communications of innocent persons less secure
  • build a decryption, interception or data retention capability
  • access communications without an existing warrant or authorisation
  • compel an employee to undertake activities without the knowledge of their employer
 
crypviser has no backdoors and was classified in india as ilegal with the explanation terrorists would use it bla bla.

I know the owner its a russian in germany and its out of the radar since its not popular but worked fine even behind the big walls.
 
Basically all apps that uses E2EE are secure to use as messages and calls are encrypted in transit.
It all depends on your threat level and how much of a target you are.
WhatsApp for example uses the Signal protocol so it is safe in transit. However, it is owned by Meta and stores your phone number and contact list, this should make alarm bells ring for those with a high threat level. However for 90% of people this will be more than good enough for most topics (that can be discussed over the phone).

Want to take it a step further, use Signal to have even less metadata and register information. Or Molly (Signal fork) if you are on Android as it also allows you to password protect the message database. Conversations CAN be extracted with tools such as Cellebrite even though you use the auto delete function (don't let it fool you or lure you into a false state of safety). With Molly even if they get physical access to the phone they need the password (please don't use 12345 etc) to the database to be able to extract any messages or media.

Want even more privacy? Add a VPN for an extra layer of protection or use it over Tor if you are ultra paranoid. Even more, buy a mobile router with VPN/Tor capability and connect the devices in Airplane mode to it. It's like asset protection, it's all about layers baby!

Basically all E2EE applications do a good job in keeping your conversations private IN TRANSIT, and as long as you don't get a software like Pegasus installed on your device you should be fine. However if you do, then nothing will help you. Wipe the phone and throw it away.
 
I think it's kind of weird that no one has made something like Skype, or even ICQ, for that matter. Why does everything have to be so damn complicated these days with apps, phone numbers, and tons of personal info?

Session is pretty good, but in my opinion, it’s missing a decent UI.