プライバシーの基準を新境地に


ユーザーIDを持たない最初のメッセンジャー

他のアプリにはユーザー ID があります: Signal、Matrix、Session、Briar、Jami、Cwtch など。
SimpleX にはありません。乱数さえもありません
これにより、プライバシーが大幅に向上します。

ユーザー ID がプライバシーに悪影響を与えるのはなぜですか? SimpleXの仕組みは?

プライベートな接続をする

このビデオでは、1回限りのQRコード、対面、またはビデオリンクを通じて友人と接続する方法を紹介しています。招待リンクを共有することでも接続できます。

Why privacy matters

Preserving the privacy of your metadata — who you talk with — protects you from:

Advertising and price discrimination

Privacy saves you money

Manipulation of elections

Privacy gives you power

Prosecution due to innocent association

Privacy protects your freedom

Make sure your messenger can't access your data!

Why SimpleX is unique

#1

You have complete privacy

SimpleXは、SimpleXプラットフォームのサーバやその他の観察者から隠すことで、あなたのプロフィール、連絡先やメタデータのプライバシーを守ります。

その他の既存のメッセージプラットフォームと異なり、SimpleXはユーザへ識別子を割り当てません — ランダムな番号さえありません

Learn more

#2

You are protected
from spam and abuse

あなたは識別子や固定されたアドレスをSimpleXプラットフォーム上で持たないため、あなたがQRコードやリンクといった一度のみ使用可能もしくは一時的なユーザアドレスを共有しない限り、誰もあなたへ連絡することができません。

Learn more

#3

You control your data

SimpleXはクライアント端末上の全てのユーザデータを ポータブルで暗号化されたデータベースフォーマットで保管します—別の端末へ移行することができます。

エンドツーエンドで暗号化されたメッセージは、SimpleXのリレーサーバ上で受信されるまで一時的に保管され、その後永久的に削除されます。

Learn more

#4

You own SimpleX network

SimpleXネットワークは、インターネット以外のいかなる暗号通貨やプラットフォームから独立しており、完全に分散化されています。

あなたは私たちの提供するサーバや 自分自身のサーバでSimpleXを使う ことができます — そして別のユーザとつながることができます。

Learn more

特徴

E2E-encrypted messages with markdown and editing

E2E-encrypted
images and files

Decentralized secret groups —
only users know they exist

E2E-encrypted voice messages

Disappearing messages

E2E-encrypted
audio and video calls

Portable encrypted database — move your profile to another device

Incognito mode —
unique to SimpleX Chat

What makes SimpleX private

Temporary anonymous pairwise identifiers

SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member.

It allows to deliver messages without user profile identifiers, providing better meta-data privacy than alternatives.

Tap to close

Out-of-band
Key exchange

Many communication platforms are vulnerable to MITM attacks by servers or network providers.

To prevent it SimpleX apps pass one-time keys out-of-band, when you share an address as a link or a QR code.

Tap to close

2-layers of
End-to-end encryption

Double-ratchet protocol —
OTR messaging with perfect Forward secrecy and Break-in recovery.

NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.

Tap to close

Message integrity
verification

To guarantee integrity the messages are sequentially numbered and include the hash of the previous message.

If any message is added, removed or changed the recipient will be alerted.

Tap to close

Additional layer of
server encryption

Additional layer of server encryption for delivery to the recipient, to prevent the correlation between received and sent server traffic if TLS is compromised.

Tap to close

Message mixing
to reduce correlation

SimpleX servers act as low latency mix nodes — the incoming and outgoing messages have different order.

Tap to close

Secure authenticated
TLS transport

Only TLS 1.2/1.3 with strong algorithms is used for client-server connections.

Server fingerprint and channel binding prevent MITM and replay attacks.

Connection resumption is disabled to prevent session attacks.

Tap to close

Optional
access via Tor

To protect your IP address you can access the servers via Tor or some other transport Overlay network.

To use SimpleX via Tor please install Orbot app and enable SOCKS5 proxy (or VPN on iOS).

Tap to close

Unidirectional
message queues

Each message queue passes messages in one direction, with the different send and receive addresses.

It reduces the attack vectors, compared with traditional message brokers, and available meta-data.

Tap to close

Multiple layers of
Content padding

SimpleX uses Content padding for each encryption layer to frustrate message size attacks.

It makes messages of different sizes look the same to the servers and network observers.

Tap to close

SimpleX Network

Simplex Chat provides the best privacy by combining the advantages of P2P and federated networks.

Unlike P2P networks

All messages are sent via the servers, both providing better metadata privacy and reliable asynchronous message delivery, while avoiding many problems of P2P networks.

Unlike federated networks

SimpleX relay servers do NOT store user profiles, contacts and delivered messages, do NOT connect to each other, and there is NO servers directory.

SimpleX network

servers provide unidirectional queues to connect the users, but they have no visibility of the network connection graph — only the users do.

SimpleXの説明

1. ユーザーが経験すること

他のメッセンジャーと同様に、連絡先やグループを作成し、双方向の会話を行うことができます。

ユーザー プロファイル識別子なしで単方向キューをどのように処理できるのでしょうか?

2. 仕組み

接続ごとに 2 つの個別のメッセージング キューを使用して、異なるサーバー経由でメッセージを送受信します。

サーバーは、ユーザーの会話や接続の全体像を把握することなく、メッセージを一方向に渡すだけです。

3. サーバーが認識するもの

サーバーはキューごとに個別の匿名認証情報を持っており、どのユーザーに属しているかはわかりません。

ユーザーは、Tor を使用してサーバーにアクセスし、IP アドレスによる相関を防ぐことで、メタデータのプライバシーをさらに向上させることができます。

Comparison with other protocols

simplex logo Signal, big platforms XMPP, Matrix P2P protocols
Requires global identity No - private Yes 1 Yes 2 Yes 3
Possibility of MITM No - secure 4 Yes 5 Yes Yes
Dependence on DNS No - resilient Yes Yes No
Single or Centralized network No - decentralized Yes No - federated 6 Yes 7
Central component or other network-wide attack No - resilient Yes Yes 2 Yes 8

  1. Usually based on a phone number, in some cases on usernames
  2. DNS-based addresses
  3. Public key or some other globally unique ID
  4. SimpleX relays cannot compromise e2e encryption. Verify security code to mitigate attack on out-of-band channel
  5. If operator’s servers are compromised. Verify security code in Signal and some other apps to mitigate it
  6. Does not protect users' metadata privacy
  7. While P2P are distributed, they are not federated - they operate as a single network
  8. P2P networks either have a central authority or the whole network can be compromised - こちらを見る

Join SimpleX

We invite you to join the conversation

Sign up to receive our updates


Get SimpleX

Break-in recovery

Also known as break-in recovery, it is the quality of the end-to-end encryption scheme allowing to recover security against a passive attacker who observes encrypted messages after compromising one (or both) of the parties. Also known as recovery from compromise or break-in recovery. Double-ratchet algorithm has this quality.

Centralized network

Centralized networks are provided or controlled by a single entity. The examples are Threema, Signal, WhatsApp and Telegram. The advantage of that design is that the provider can innovate faster, and has a centralized approach to security. But the disadvantage is that the provider can change or discontinue the service, and leak, sell or disclose in some other way all users' data, including who they are connected with.

Content padding

Also known as content padding, it is the process of adding data to the beginning or the end of a message prior to encryption. Padding conceals the actual message size from any eavesdroppers. SimpleX has several encryption layers, and prior to each encryption the content is padded to a fixed size.

End-to-end encryption

A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.

Forward secrecy

Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.

Key exchange

Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.

Overlay network

Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.

© 2020-2023 SimpleX | Open-Source Project