Репост из: Onion News
Tor at the Heart: Tor Messengerhttps://blog.torproject.org/blog/tor-heart-tor-messenger
During the month of December, we're highlighting other organizations and projects that rely on Tor, build on Tor, or are accomplishing their missions better because Tor exists. Check out our blog each day to learn about our fellow travelers. And please support the Tor Project! We're at the heart of Internet freedom.
Donate today (https://torproject.org/donate/donate-blog14)!
Tor Messenger (https://trac.torproject.org/projects/tor/wiki/doc/TorMessenger) is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It supports a wide variety of transport networks, including XMPP, IRC, Twitter, and others; enables Off-the-Record (OTR) Messaging (https://otr.cypherpunks.ca/) automatically; has an easy-to-use graphical user interface; and has a secure automatic updater.
Tor Messenger builds on the networks you are familiar with, so you can continue communicating in a way your contacts are willing and able to do.
It's based on Instantbird (http://instantbird.com/), an instant messaging client developed in the Mozilla community, and leverages both the code (Tor Launcher, updater) and in-house expertise that the Tor Project has garnered working on Tor Browser with Firefox.
It was launched in Oct. 2015 (https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily) and has since been receiving steady security and stability releases. However, there remain a few important items on the short term roadmap,
Making the build reproducible on more platforms (https://trac.torproject.org/projects/tor/ticket/10942) (so far only Linux)
Porting some Tor Button-like features (https://trac.torproject.org/projects/tor/ticket/16494) (security slider, new circuit for site)
Taking advantage of Yawning's sandboxing work (https://trac.torproject.org/projects/tor/ticket/10943)
Translations (https://trac.torproject.org/projects/tor/ticket/10945) and documentation (https://trac.torproject.org/projects/tor/ticket/10947)
Engaging an independent audit (https://trac.torproject.org/projects/tor/ticket/10944)
This summer, the team participated in GSoC, helping to mentor a project implementing CONIKS (https://trac.torproject.org/projects/tor/ticket/17961). CONIKS (https://coniks.cs.princeton.edu/) is a key verification system with the goal of easing the burden of key management for end-users, while at the same time not asking users to trust their communication providers to act in their interest. An alpha release (https://lists.cs.princeton.edu/pipermail/coniks/2016-December/000005.html) was recently tagged.
At the Tor developers' meeting in Seattle this past September, we held several sessions on messaging (https://trac.torproject.org/projects/tor/wiki/org/meetings/2016SummerDevMeeting/Notes/Messaging). One of the goals was to help determine where to take Tor Messenger in the future. The consensus was that we should be focused on eliminating metadata, both in the currently supported networks (where this might materialize as rosterless communication (https://trac.torproject.org/projects/tor/ticket/20293) or having temporary identities (https://trac.torproject.org/projects/tor/ticket/16606)), or incorporating new networks with architectures like those found in other onion messaging systems (https://trac.torproject.org/projects/tor/ticket/16203). There are many unsolved problems here, like balancing serverless communication with presence detection and asynchronous messaging, and we're excited to help push the field forward (https://blog.torproject.org/blog/tor-heart-onion-messaging).