
Мессенджеры
Защищает от следующих угроз:
These recommendations for encrypted real-time communication are great for securing your sensitive communications. These instant messengers come in the form of many types of communication networks.
Video: It's time to stop using SMS
Signal
Signal - мобильное приложение, разработанное Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal protocol, an extremely secure encryption protocol which supports forward secrecy2 and post-compromise security.3
Signal requires your phone number for registration, however you should create a username to hide your phone number from your contacts:
- In Signal, open the app's settings and tap your account profile at the top.
- Tap Username and choose Continue on the "Set up your Signal username" screen.
- Enter a username. Your username will always be paired with a unique set of digits to keep your username unique and prevent people from guessing it. For example if you enter "John" your username might end up being
@john.35
. By default, only 2 digits are paired with your username when you create it, but you can add more digits until you reach the username length limit (32 characters). - Go back to the main app settings page and select Privacy.
- Select Phone Number.
- Change the Who Can See My Number setting to Nobody.
- (Optional) Change the Who Can Find Me By Number setting to Nobody as well, if you want to prevent people who already have your phone number from discovering your Signal account/username
We have some additional tips on configuring and hardening your Signal installation:
Signal Configuration and Hardening
Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with.
Signal supports private groups, where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when Sealed Sender is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam.
The protocol was independently audited in 2016. The specification for the Signal protocol can be found in their documentation.
Molly (Android)
If you use Android and your threat model requires protecting against Targeted Attacks you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.
Molly is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and more. It also has usability improvements including scheduled backups, automatic locking, and the ability to use your Android phone as a linked device instead of the primary device for a Signal account.
Downloads
Molly is updated every two weeks to include the latest features and bug fixes from Signal. The exception is security issues, which are patched as soon as possible. That said, you should be aware that there might be a slight delay compared to upstream, which may affect actions such as migrating from Signal to Molly.
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team and the Molly team to deliver safe and timely updates.
Molly-FOSS is a version of Molly which removes proprietary code like the Google services used by both Signal and Molly at the expense of some features (like battery-saving push notifications via Google Play Services). You can set up push notifications without Google Play Services in either version of Molly with UnifiedPush. Using this notification delivery method requires access to a MollySocket server, but you can choose a public MollySocket instance for this.1
Both versions of Molly provide the same security improvements and support reproducible builds, meaning it's possible to confirm that the compiled APKs match the source code.
SimpleX Chat
SimpleX Chat is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against Censorship.
SimpleX Chat provides direct messaging, group chats, and E2EE calls secured with the SimpleX Messaging Protocol, which uses double ratchet encryption with quantum resistance. Additionally, SimpleX Chat provides metadata protection by using unidirectional "simplex queues" to deliver messages.
To participate in conversations on SimpleX Chat, you must scan a QR code or click an invite link. This allows you to verify a contact out-of-band, which protects against man-in-the-middle attacks by network providers. Your data can be exported and imported onto another device, as there are no central servers where this is backed up.
You can find a full list of the privacy and security features implemented in SimpleX Chat in the app's repository.
SimpleX Chat was independently audited in July 2024 and in October 2022.
Briar
Briar is an encrypted instant messenger that connects to other clients using the Tor network, making it an effective tool at circumventing Censorship. Briar также может передавать сообщения через Wi-Fi или Bluetooth, если получатель находится в непосредственной близости. Режим локальной сети Briar может быть полезен, когда Вы не имеете доступа к Интернету.
Downloads
To add a contact on Briar, you must both add each other first. You can either exchange briar://
links or scan a contact’s QR code if they are nearby.
Briar has a fully published specification. Briar supports forward secrecy2 by using the Bramble Handshake and Transport protocol.
The client software was independently audited, and the anonymous routing protocol uses the Tor network which has also been audited.
Критерии
Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем. В дополнение к нашим стандартным критериям мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Перед тем, как вы решите выбрать какой-либо проект, мы рекомендуем вам ознакомиться со списком критериев и провести собственное исследование, чтобы убедиться в правильности своего выбора.
Минимальные требования к сервисам
- Must have open-source clients.
- Must not require sharing personal identifiers (particularly phone numbers or emails) with contacts.
- Must use E2EE for private messages by default.
- Must support E2EE for all messages.
- Must support forward secrecy2
- Must have a published audit from a reputable, independent third party.
В лучшем случае
Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных.
- Should support future secrecy (post-compromise security)3
- Should have open-source servers.
- Should use a decentralized network, i.e. federated or P2P.
- Should use E2EE for all messages by default.
- Should support Linux, macOS, Windows, Android, and iOS.
Функция "цифрового наследия": Термин "цифровое наследие" подразумевает под собой набор функций, который позволяет вам регулировать права доступа других людей к вашей информации после того, как вы умрете
-
You may refer to this step-by-step tutorial in German on how to set up UnifiedPush as the notification provider for Molly: https://kuketz-blog.de/messenger-wechsel-von-signal-zu-molly-unifiedpush-mollysocket-ntfy. ↩
-
Forward secrecy is where keys are rotated very frequently, so that if the current encryption key is compromised, it does not expose past messages as well. ↩↩↩
-
Future secrecy (or post-compromise security) is a feature where an attacker is prevented from decrypting future messages after compromising a private key, unless they compromise more session keys in the future as well. This effectively forces the attacker to intercept all communication between parties since they lose access as soon as a key exchange occurs that is not intercepted. ↩↩
Вы читаете Русский перевод сайта Privacy Guides, выполненный нашей невероятной командой переводчиков на платформе Crowdin. Если вы заметили ошибку или непереведенные части на этой странице, пожалуйста, помогите нам! Перейти на Crowdin
You're viewing the Russian copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!