Tinfoil Chat (TFC) is a FOSS+FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from passive collection, MITM attacks and most importantly, remote key exfiltration. TFC is designed for people with one of the most complex threat models: Organized crime groups and nation state hackers who bypass end-to-end encryption of traditional secure messaging apps by hacking the endpoint.
TFC uses XChaCha20-Poly1305 end-to-end encryption with deniable authentication to protect all messages and files sent to individual recipients and groups. The symmetric keys are either pre-shared, or exchanged using X448, the base-10 fingerprints of which are verified via an out-of-band channel. TFC provides per-message forward secrecy with BLAKE2b based hash ratchet. All persistent user data is encrypted locally using XChaCha20-Poly1305, the key of which is derived from password and salt using Argon2id, the parameters of which are automatically tuned according to best practices. Key generation of TFC relies on Linux kernel's getrandom(), a syscall for its ChaCha20 based CSPRNG.
OnionComms is server configuration to host chat applications over Tor using onion services. Servers supported:
How to set up a Prosody server as a Tor hidden service. OTR and OMEMO support will be enabled. No MUC support yet. Has a bunch of working configuration files to crib from.
Briand's project to turn an ESP32 microcontroller board into a plug play Tor client.
The goal is to write a very simple C++17 working Tor proxy for ESP32 so the ESP32 could be attached to any computer with a bash/dos/putty client ready-to-go. Using ESP as a proxy allows to keep no traces of Tor client/browser on your computer (but traces of the navigation history and so on are not avoided!)
REMEMBER: The ESP32 is a 240MHz processor with 320KB of RAM. Do not expect good performance or fast webpage loading!
A small service which indexes Tor hidden services by proxying for YaCy (which does the actual heavy lifting).
An Ansible playbook for setting up an Ansible XMPP server as a Tor hidden services. Notable because there's a main.yml file that describes how to configure the Tor hidden service itself. It lists all the ports that have to be available at the hidden service. It also has a sample Prosody config file that describes how to configure Prosody to serve up a hidden service and have it work.
This is a module for Prosody that allows federation to other XMPP servers running as Tor hidden services. If you just want to set up a hidden service, you don't really need this.
A site that keeps track of the statuses of various Tor network markets. No RSS, no API, can probably scrape it.
An implementation of the control-spec for Tor using the Twisted networking library for Python. This is useful for writing utilities to control or make use of Tor in event-based Python programs. If your Twisted program supports endpoints (like twistd does) your server or client can make use of Tor immediately, with no code changes. Start your own Tor or connect to one and get live stream, circuit, relay updates; read and change config; monitor events; build circuits; create onion services; etcetera (ReadTheDocs).
A command line utility which makes it easy to use certain applications with Tor.
A suite of shell scripts to automate the installation and configuration of FreeBSD in such a manner as to support anonymity and security. Helps with the rapid deployment of BSD machines that can then be used as Tor nodes, hidden service providers, and locked-down desktop machines.
A search engine for Tor hidden services. The problem is that it's on the public Net so if you don't want your services known you'll have to take additional measures. It also exposes your activity on the public Net so don't think that you'll have much privacy.
A FOSS utility for investigating Tor hidden services. Searches for configuration errors and information leaks. Written in golang. In the AUR. CLI tool but the Onionscan Correlation Lab is a webapp that lets you analyze the data visually.
OONI is a project for collecting and analyzing data pertaining to Internet censorship and surveillance around the world. The project aims to determine and chart just what measures are in place where and how effective they are.
Their source code reside in a Git repository at torproject.org.
The site is also accessible through this Tor hidden service: http://5m4rylprkig4swgg.onion/
APAF is a set of modules for Python that make it easier to develop network applications (it's built on top of Twisted) that run inside of darknets primarily (the Tor network, in particular). Cross platform. Designed to be run portably (i.e., without installation). Tries to make it as easy as possible to set up the networking stuff so you can concentrate on the application stuff. Engineered so that the traffic runs over Tor nicely and safely, but ensuring that you don't screw up and leak data is up to you.