Em sex, 19 de abr de 2019 às 03:42, Van Gegel <torf...@ukr.net> escreveu:
> Seven years ago I performed the first tests for voice transmission over > the Tor network. Recently I returned to this topic and reanimated the old > project: it became cross-platform, modular and using modern cryptography. > Alpha versions for Windows, Android and Linux (including ARM) are being > tested now. There will also be versions for iOS and bare metal (RPi for Tor > and transport + isolated Cortex M4 for crypto and voice). Features: open > SW/HW, server-less, voice calls to onion-address, optional NAT traversal > using Tor for p2p UDP connection, possibility of direct call to TCP IP:port > including isolated local network. For direct calls added obfuscating > similar to obfs4 (with elligator2 representations, random padding, timings, > two-session connecting, proof of job etc). Source code (cross-platform core > and GUI for all platforms) will be published a little later but now you can > try the Android alpha version to evaluate the voice latency in Tor: > > http://torfone.org/download/Torfone.apk > http://torfone.org/download/Torfone_Android_howto.pdf > > Note: after exchanging contacts during the first call next authenticated > calls have a lower latency since several Tor circuits are used in parallel. > There are no any IP leaks when working over Tor as the only single TCP > connection to the onion-address is used (custom protocol for voice transfer > optimized for Tor environment). Android APK includes the Tor executable > compiled using standalone NDK from the repository > https://github.com/n8fr8/tor-android > Incredible, very good! Thank you very much, I'll test that. My concern is how I anonymously locate the destination to talk to him, the phone number solves this issue, that's what WhatsApp does. -- Regards GTI -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk