Official repository: https://git.anonymousmessenger.ly/dx/AnonymousMessenger
Official website: https://www.anonymousmessenger.ly/
Translate: https://www.transifex.com/liberty-for-all/anonymous-messenger/
A peer to peer private anonymous and secure messenger that works over Tor. It's also free and open source software which gives users the freedom of changing it and redistributing it under the terms of the GNU General Public License v3.
This project was started in July 2020, by Sofian Mahmoud Benissa (software developer) after a series of meetings with Alton James Steele (project funder) where the idea of the project was presented.
* Double triple Diffie-Hellman end to end encryption
* Completely peer to peer using hidden services
* Cryptographic Identity Verification
* Excellent Network Security
* Voice Messages
* Live Voice Calls over tor (alpha feature)
* Text Messages
* Metadata stripped media messages
* Raw file sending of any size (100 GB+)
* Both peers have to add each others onion addresses to be able to communicate
* Disappearing messages by default
* Encrypted file storage on Android
* Screen security
Anonymous Messenger utilizes Tor for it's anonymity network and data transport security using the onion v3 protocol and the ability to run onion services on any device and connect directly and anonymously without having to set up any servers, also it uses the signal protocol to encrypt all data before sending it over the Tor network directly to the intended receiver, which means we get two layers of end-to-end encryption without using any server or service.
Instead of using http Anonymous Messenger uses it's own transport protocol which is written for anonymity and simplicity. For example when we send a message we encrypt it using the Signal protocol then we establish an onionV3 encrypted connection and send the encrypted message over the already encrypted connection.
Anonymous Messenger encrypts data stored on the user's device with the user's password using SQLcipher for the database and encrypts all files with AES/GCM/NoPadding cipher.
Anonymous Messenger can be built as an android project (eg. using Android Studio or Gradle). We recommend you change the applicationId if you want to install multiple versions on the same device.
Anonymous Messenger depends on Tor and obfs4proxy and they must be included for your device's architecture in the jniLibs directory 'app/src/main/jniLibs/[ARCH]' and they need to be named libtor.ARCH.so and obfs4proxy.ARCH.so
We have forked the tor-android repository to provide a script that builds Tor for our supported architectures (armeabi-v7a,arm64-v8a,x86,x86_64) visit: https://git.anonymousmessenger.ly/dx/tor-android
To build obfs4proxy for android we have an empty repo with a readme that contains the commands needed, visit: https://git.anonymousmessenger.ly/dx/obfs4android
Tor is used in this project to connect directly and anonymously to peers
The signal protocol is used to encrypt all messages and their attachments in a verifiable E2E encrypted way
JCodec2 is used to compress audio to use as little bandwidth as possible due to the Tor network being unstable at times and due to slow internet speeds used by the users
Obfs4proxy is being used to connect to some Tor bridges while making the connection not seem like a Tor connection when Tor is being censored in the user's country
Used to scan Qr-codes to add addresses in person quicker
Used to encrypt the application's database.
Used to present pictures in-app dismissible by gestures
Used to provide refresh feature by pulling from the top or bottom of the contact list