プライバシーの基準を新境地に
ユーザーIDを持たない最初のメッセンジャー
他のアプリにはユーザー ID があります: Signal、Matrix、Session、Briar、Jami、Cwtch など。
SimpleX にはありません。乱数さえもありません。
これにより、プライバシーが大幅に向上します。
他のアプリにはユーザー ID があります: Signal、Matrix、Session、Briar、Jami、Cwtch など。
SimpleX にはありません。乱数さえもありません。
これにより、プライバシーが大幅に向上します。
このビデオでは、1回限りのQRコード、対面、またはビデオリンクを通じて友人と接続する方法を紹介しています。招待リンクを共有することでも接続できます。
Preserving the privacy of your metadata — who you talk with — protects you from:
Advertising and price discrimination
Privacy saves you moneyManipulation of elections
Privacy gives you powerProsecution due to innocent association
Privacy protects your freedomMake sure your messenger can't access your data!
E2E-encrypted messages with markdown and editing
E2E-encrypted
images and files
Decentralized secret groups —
only users know they exist
E2E-encrypted voice messages
Disappearing messages
E2E-encrypted
audio and video calls
Portable encrypted database — move your profile to another device
Incognito mode —
unique to SimpleX Chat
Simplex Chat provides the best privacy by combining the advantages of P2P and federated networks.
All messages are sent via the servers, both providing better metadata privacy and reliable asynchronous message delivery, while avoiding many problems of P2P networks.
SimpleX relay servers do NOT store user profiles, contacts and delivered messages, do NOT connect to each other, and there is NO servers directory.
servers provide unidirectional queues to connect the users, but they have no visibility of the network connection graph — only the users do.
|
Signal, big platforms | XMPP, Matrix | P2P protocols | |
|---|---|---|---|---|
| Requires global identity | No - private | Yes 1 | Yes 2 | Yes 3 |
| Possibility of MITM | No - secure 4 | Yes 5 | Yes | Yes |
| Dependence on DNS | No - resilient | Yes | Yes | No |
| Single or Centralized network | No - decentralized | Yes | No - federated 6 | Yes 7 |
| Central component or other network-wide attack | No - resilient | Yes | Yes 2 | Yes 8 |
We invite you to join the conversation
Sign up to receive our updates
Get SimpleX
Also known as break-in recovery, it is the quality of the end-to-end encryption scheme allowing to recover security against a passive attacker who observes encrypted messages after compromising one (or both) of the parties. Also known as recovery from compromise or break-in recovery. Double-ratchet algorithm has this quality.
Centralized networks are provided or controlled by a single entity. The examples are Threema, Signal, WhatsApp and Telegram. The advantage of that design is that the provider can innovate faster, and has a centralized approach to security. But the disadvantage is that the provider can change or discontinue the service, and leak, sell or disclose in some other way all users' data, including who they are connected with.
Also known as content padding, it is the process of adding data to the beginning or the end of a message prior to encryption. Padding conceals the actual message size from any eavesdroppers. SimpleX has several encryption layers, and prior to each encryption the content is padded to a fixed size.
A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.
Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.
Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.
Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.