Tox: Text, voice, and video chats without a central server
Peer Group
The Tox protocol uses file-sharing techniques for messaging and audio-video chats, which gives users a greater degree of privacy and freedom.
The popular messaging application WhatsApp has recently alienated many users with its new terms of service and privacy policy. It's a situation that once again illustrates that when you put yourself in the hands of a proprietary service, you put yourself at the mercy of the operator. If you are dissatisfied with a change, either you grudgingly continue using the service, or you move to a different application with similar features.
In the case of WhatsApp, there are quite a few alternatives, and many were suddenly overrun with WhatsApp users looking for another option. This article looks at the different categories of messaging services, and then delves into one particular option – using peer-to-peer messaging apps based on the Tox protocol.
Open Source Clients
Signal [1], Threema [2], and Telegram [3] are widely regarded as good alternatives to WhatsApp, partly on the grounds that they operate more freely and openly than the Facebook service. This typically means releasing the app source code under open source licenses and disclosing the underlying protocol so that other app developers can develop alternative clients (see Table 1).
Table 1
Instant Messengers Compared
Service | Server | Client(s) | Protocol | E2EE* |
---|---|---|---|---|
Centralized |
||||
|
Proprietary |
Proprietary |
Proprietary |
Yes |
Signal |
Open source |
Open source |
Signal |
Yes |
Threema |
Proprietary |
Open source |
App Remote Protocol |
Yes |
Telegram |
Proprietary |
Open source |
MTProto 2.0 |
Yes |
Federated |
||||
Dino |
Open source |
Open source |
XMPP |
Yes |
Quicksy |
Open source |
Open source |
XMPP |
Yes |
Element |
Open source |
Open source |
Matrix |
Yes |
Peer-to-Peer |
||||
Briar |
None |
Open source |
Bramble |
Yes |
Jami |
None |
Open source |
OpenDHT |
Yes |
Tox |
None |
Open source |
Tox |
Yes |
*E2EE = end-to-end encryption |
However, discussions of social media alternatives often leave out one very important component: the server. All providers keep a watchful eye on the server and therefore on the data. Telegram and Threema do not disclose the source code for the server. Signal does provide the source code for the server under a free license, so users could theoretically build their own Signal servers. However, the software is designed in such a way that the different instances cannot talk to each other. If the same principle applied to email, then users of one service (such as Yahoo Mail) would not be able to send messages to those of another service (e.g., Gmail).
Federated Systems
True freedom exists only if the service discloses the source code of the server and client(s) and the underlying protocols. In addition, the network systems must operate in a federated manner, that is, in a distributed manner (federation). However, this kind of freedom goes against the business interests of commercial providers. Therefore, none of the major providers offer this level of freedom. What remains are services and programs such as Dino [4] and Quicksy [5], which are based on the classic XMPP (formerly Jabber) [6], and applications such as Element, which is based on the Matrix [7] open communications protocol.
Peer-to-Peer Networks
Instant messengers can do without any kind of a central authority. They work in a similar way to file-sharing programs like eDonkey or BitTorrent. Messages or voice and video chats travel directly from computer to computer (peer-to-peer) over the network. The contacts are organized with the help of a distributed hash table (DHT). End-to-end encryption ensures that privacy is maintained and that only the sender and the recipient can read the messages.
In this category, the selection of programs is thinned out even further. The last tools standing are Briar [8], Jami [9], and Tox [10]. Briar is available exclusively for Android-based smartphones and tablets. I have already covered Jami in detail in a previous issue [11], so now it is time for a closer look at Tox.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Gnome OS Adopting systemd-sysupdate
Gnome OS is about to undergo a major under-the-hood change that promises enhanced security.
-
Endless OS 6 has Arrived
After more than a year since the last update, the latest release of Endless OS is now available for general usage.
-
Fedora Asahi 40 Remix Available for Macs with Apple Silicon
If you've been anticipating KDE's Plasma 6 for your Apple Silicon-powered Mac, then you're in luck.
-
Red Hat Adds New Deployment Option for Enterprise Linux Platforms
Red Hat has re-imagined enterprise Linux for an AI future with Image Mode.
-
OSJH and LPI Release 2024 Open Source Pros Job Survey Results
See what open source professionals look for in a new role.
-
Proton 9.0-1 Released to Improve Gaming with Steam
The latest release of Proton 9 adds several improvements and fixes an issue that has been problematic for Linux users.
-
So Long Neofetch and Thanks for the Info
Today is a day that every Linux user who enjoys bragging about their system(s) will mourn, as Neofetch has come to an end.
-
Ubuntu 24.04 Comes with a “Flaw"
If you're thinking you might want to upgrade from your current Ubuntu release to the latest, there's something you might want to consider before doing so.
-
Canonical Releases Ubuntu 24.04
After a brief pause because of the XZ vulnerability, Ubuntu 24.04 is now available for install.
-
Linux Servers Targeted by Akira Ransomware
A group of bad actors who have already extorted $42 million have their sights set on the Linux platform.