Our valued sponsor

Alternative to Signal and TG ?

turmpy

Mentor Group Lifetime
Mar 26, 2024
81
38
43
Register now
You must login or register to view hidden content on this page.
I urgent need a good and userfriendly alternative to Skype, so I found this thread in mentor group, which is insane good for an anonymous temporary soultion for TG

however, it does not work long term, so I looked into Signal which also is suggested in this thread, STOP requires smartphone.

Isn't there anything good there except Teams that work like skype but does not require smartphone?
 
  • Like
Reactions: sebastian
Skype is a living fossil. Get a burner phone number if you don't want to expose your phone number.

There are alternatives but you'll probably find yourself quite lonely. The most popular messaging apps these days are smartphone based. You can use Session, Briar, Matrix.org (Element), SimpleX, XMPP Jabber, and so on... But what's the point unless most of your contacts are also there?

Maybe Discord? It's a very different app than Skype since it's mainly focused on larger channels/groups. Lots families, friend groups, and communities use Discord as a messaging app. But you could use it just for direct messages and group chats.

Slack and Guilded are similar to Discord but less popular for this use case.
 
  • Like
Reactions: ilke
We recently had a good discussion here:

I think Session and SimpleX are quite good for privacy.
 
I urgent need a good and userfriendly alternative to Skype, so I found this thread in mentor group, which is insane good for an anonymous temporary soultion for TG

however, it does not work long term, so I looked into Signal which also is suggested in this thread, STOP requires smartphone.

Isn't there anything good there except Teams that work like skype but does not require smartphone?
Article author here.

It actually does work long term I can confirm from personal experience. There is zero issues with this setup as you hold everything yourself. No need for smartphones or keeping phone numbers active which I would argue by that logic many services who rely on SMS/phone number aren't long-term. If you or anyone else sees something that is overlooked, I would be happy to hear your thoughts.

Needless to say Telegram is an awful choice for a messenger in terms of security or privacy. But if you are forced to use it... as @Sols said it matters where your friends/customers are. I also agree with his suggestion to get a burner phone if you don't want your number exposed.
We recently had a good discussion here:

I think Session and SimpleX are quite good for privacy.
In the interest of public safety and how many OCT users blindly use Session I will try to give my personal opinion on this without it derailing the topic as this is can become a really lengthy discussion.

My opinion is Session isn't good enough for privacy or security if you are looking for the very best. If you are OK with any risk might as well use imessage or android sms now powered & "secured" by Google. Just because a few people are jumping on that bandwagon it doesn't mean it is secure - another example for this is Telegram. The minute Session team started with bulls**t wordaround explanation of why you don't need Perfect Forward Secrecy (PFS) that said all you need to know about them. Refering to:
Why doesn't Session have PFS?
Simply put, Session mitigates the same risks that PFS does in other ways.

Through fully anonymous account creation, onion routing, and metadata minimisation, Session provides just as effective protection in real-world scenarios as PFS does, and in some cases even better protection.
(https://getsession.org/faq)

Instead of making sure a standard such as PFS is met, they decide to mitigate it in their own way. Let's write our own cryptography, what can go wrong? (too much information to reference, google yourself why not to do it). Who profits from PFS not being integrated? Only one entity and the hint is in this wikipedia article https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later

What is stopping Session team from having both their own solution and standard PFS? That is why this is fishy to developers, security experts etc. who understand the details of it. In all honesty the people who decide to do cryptography their own way or implement something their own way are the same type of people who say we shouldn't add quantum encryption on top of any protocol because it wouldn't be secure. Makes much logic? Nothing stops anyone (well maybe certain "harvesters of encrypted data" spreading bulls**t) from utilizing both the verified solution wrapped around the experimental one.

Session also being Australian screams major red flags as Australia has some really truly awful anti-security laws when it comes to cryptography. It is no secret Session is referred to as an inferior Signal and even a honeypot. Whether you believe that is up to you to do your own due diligence and research. I know many users here and other forums use Session but that is the facts of the matter and it is those facts that I form my opinion what to believe in or not.

SimpleX is yet to be proven. Written in Haskell which who uses? Most notably Haskell used by Meta and Wire messenger (another not so secure messenger, for history brief ref see https://medium.com/@DarKrMsg/the-rise-and-fall-of-wire-messenger-469c9c1da27f). Interesting choice of programming language and seems large project completed definitely doesn't look like a hobby project. This is only speculation of course, I'm only outlining what is written in.

My biggest issues with SimpleX are 3.

1) First one and biggest one is there are NO REPRODUCIBLE BUILDS. This means all of their source code might as well be good for nothing if you can't compile it yourself. I want to the direct everyones attention to:

Quote:
the lack of reproducible builds. While not debating the importance of reproducible builds, we offer a mitigation. Unlike many projects (including Signal and Cwtch, referenced by u/86rd9t7ofy8pguh as providing better security and privacy), we now sign release commits with the PGP key that is also published in openpgp.org, so the users can build from source and validate the code origin. While it is not a replacement to reproducible builds, it offers a mitigation for the users with higher security requirements. We will adding reproducible builds this year, it is the next priority after solving several other build problems: migration of armv7a build to the new compiler, reducing the binary size and improving some other security aspects of build and distribution process.

Remember what I said earlier in the post about people making their own cryptography, offering words workarounds of "why not" etc.? We can now add the "we offer a mitigation" to those same group of people just as easily. What is the point of open source when you can't reproduce the builds? In this way Signal are just as bad for not allowing ability to run own servers.

In the end SimpleX team might provide those builds sure but for a privacy & security project and all of this talk of security they fail to do the most simple thing for users to gain trust - verify yourself. This is why users as recent as 4 days ago have asked where are all the "simpleX is honeypot" comments are coming from
2) Second one is they seem to be doing a lot of fake marketing by claiming things like Signal can intercept messages on their website (https://simplex.chat). Reddit discussion says it pretty much how it is:


In addition I would raise it even further by claiming their table of comparisons on their website is more, lets call it "incorrect":
  1. XMPP requires phone number as "global identity"? SimpleX answer: Yes. My answer? False. Anyone can register with any server (thousands of them) for free not even email needed.
  2. XMPP depends on DNS? SimpleX answer: Yes. My answer? False. You can run it under different networks including Tor, where is the DNS there?
  3. Possibility of MITM? SimpleX answer: Yes. My answer? True and False. It is True standard XMPP can be intercepted in almost clear text however anyone using XMPP today and not in the 2000s, now uses a plugin for security. Up until some years ago that plugin was OTR and now the standard is OMEMO. OMEMO is same one used by Signal. OMEMO doesn't have the possibility of MITM.
3) SimpleX is a fairly new "thing". If 1 & 2 are resolved it would take some time and additional audits of multiple firms and individuals over a longer period to convince me personally to use it. A bonus point to this is it is heavily advertised on certain darknet forums. No wonder why people on the reddit thread I mentioned gives them "anom/encrochat" vibes.


tldr;
If you are looking for alternative that is secure, decentralized/federated then XMPP in combination with a plugin like OMEMO (which is what Signal uses) is the perfect choice. You can register at any server, setup your own server, no IDs, no phone numbers, fully open source reproducible builds, open source OMEMO plugin, battle tested.
 
Last edited:
Register now
You must login or register to view hidden content on this page.