Get a secure, anonymous, peer-to-peer instant messenger
One messenger for Internet and LAN chat with end-to-end encryption
Technitium Mesh is a secure, anonymous, peer-to-peer (p2p), open source instant messenger designed to provide end-to-end encryption. Primary aim of developing this instant messenger is to provide privacy which is achieved using cryptography and anonymity using Tor network. It can be used over Internet and private LAN networks (without Internet) for instant messaging and file transfer with support for private chats and group chats.
Mesh is based on Bit Chat and is its successor. Mesh takes core ideas from its predecessor and removes a few. Notably, Mesh does not require centralized user registration and provides anonymous profile support using Tor hidden service. It also removes use of BitTorrent trackers for finding peers which was causing issues with Bit Chat since some ISPs blocking BitTorrent traffic would also block Bit Chat traffic. Instead, Mesh relies only on Distributed Hash Tables (DHT) for all purposes.
Mesh allows creating both pure p2p and anonymous profiles with support for running multiple profiles concurrently. Both p2p and anonymous profiles are interoperable such that a p2p profile user can connect with an anonymous profile user via Tor Network.
With Mesh, there is no meta data generated. User identifier is designed in such a way that it can be changed anytime to hide identity. Since, there is no user registration, we don't know who uses Mesh or how many people use it. In p2p mode, the connections use IPv4 or IPv6 connectivity directly to connect with peers without any server in between. With anonymous mode, all connectivity occurs over Tor network and uses Tor hidden service to accept inbound connections.
- Serverless, peer-to-peer architecture that uses Distributed Hash Tables (DHT).
- No meta data is stored since even we don't know to whom you are chatting with.
- Works as LAN chat just as it works on the Internet.
- Works in private LAN networks not connected to Internet.
- Anonymous profiles use Tor Network to hide your identity.
- Uses RSA 2048 bit keys to generate profiles.
- Provides end-to-end encryption with Perfect Forward Secrecy (PFS) using DHE-2048 or ECDHE-256.
- Protocol is secured with AES 256-bit encryption with Authenticated Encryption.
- Changeable user identifier to hide identity.
- Open source implementation allows you to inspect the code.
Frequently Asked Questions (FAQ)
Read this FAQ page which should answer most of your queries.
Become A Patron
Make contribution to Technitium by becoming a Patron and help making new software, updates, and features possible.