List of mobile instant messengers
This list contains information about computer programs (“ apps ”) that are used on mobile devices ( smartphones , tablets ) for instant messaging .
Functions
Encryption | Functions | Others | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Messenger | Free software | End-to-end | Client server | Authentication | Deniability | PFS | Picture messages | Group chat | Asynchronous communication | Transfer of contacts | Self-hosted server | Federation |
Bleep | No | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown |
Blackberry Messenger | No | No | Unknown | Blackberry PIN | Unknown | Unknown | any files | Yes | Unknown | Optional | No | No |
BLACKPIN | No | AES 256 | TSL / SSL | Yes | No | Yes | Yes | Yes | No | No | ||
ChatSecure (formerly Gibberbot) |
Apache 2.0 (Android), GPLv3 + (iOS) | OTR (optional), OMEMO | TLS / SSL | Yes | Yes | Yes | Yes | not enabled by default | Yes | Unknown | Yes (XMPP) | Yes |
Chiffry | No | In-house development (256-bit AES-GCM and 512-bit ECDH / ECDSA) | Yes | Yes | Yes | Yes | Yes | Yes (decentralized) | Yes | No | Yes (business version) | Unknown |
cameoNet | AGPLv3 | In-house development | TLS / SSL | Yes | No | No | Yes | Yes | Yes | No | Unknown | Unknown |
Conversations | GPLv3 | OpenPGP, OMEMO | TLS | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes (XMPP) | Yes |
Delta chat | GPLv3 | OpenPGP, Autocrypt | TLS / SSL (see note) |
Yes | No | No | Yes | Yes | Yes | No | Yes | Yes |
FriendCaller | No | In-house development ( RSA / AES) |
TSL, SSL | Yes | Unknown | Unknown | Yes | Yes | Yes | Optional | Yes | Unknown |
Hike | No | Unknown | SSL (see note) |
Unknown | Unknown | Unknown | Only unencrypted | Only unencrypted | Only unencrypted | Yes | No | No |
Hoccer | No | In-house development (RSA / AES) | TLS / SSL | Yes | Optional, messages can be signed | Yes | Yes | Yes | Yes | No | No | No |
ICQ | No | Unknown | SSL | Unknown | Unknown | Unknown | Yes | Yes | Yes | Optional | No | No |
IM + | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | A separate server is possible depending on the choice of protocol | The messenger supports several protocols, some of which are federations |
Jami (software) | GPLv3 | Yes | All P2P communication with E2E (TSL) | |||||||||
Jongla | No | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Yes | Unknown | Unknown |
KakaoTalk | No | Unknown | SSL | Unknown | Unknown | Unknown | Yes | Unknown | Unknown | Unknown | No | No |
Kik | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Yes | Yes | Unknown | Unknown | Unknown | Unknown |
Kontalk | GPLv3 | OpenPGP | TLS / SSL | Yes | No | No | Yes | Yes | Yes | Their hashes | Yes, other server can be set | Yes |
Line | No | Yes | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Optional | No | No |
OneTime Messenger | No | No | Yes | No | No | No | Yes | Yes | Unknown | Yes | No | No |
Rainbow | No | Yes | TLS | Yes | Unknown | Unknown | Yes | Yes | Yes | No | No | Yes |
element | Apache 2.0 | Double ratchet (optional) | Unknown | Yes | Unknown | Unknown | Yes | Yes | Yes | Optional | Yes | Yes |
SecureChat | No | Axolotl | TLS / SSL | Yes | Yes | Yes | Yes | Yes | Unknown | Yes | Unknown | Unknown |
For sure | No | In-house development | TLS / SSL | Unknown | Unknown | No | Yes | Yes | Yes | Yes | Unknown | Unknown |
signal | GPLv3 | Signal protocol | TLS / SSL | Yes | Yes | Yes | Yes | Yes | Yes | Their hashes | Yes (without voice calls) | No |
SIMSme | No | In-house development (RSA / AES) | SSL | Yes | No | No | Yes | Yes | Yes | Their hashes | No | No |
Skype | No | Unknown | Unknown | No | Unknown | Unknown | Yes | Yes | Yes | Yes | No | No |
Surespot | GPLv3 | In-house development | SSL | No | No | No | Yes | No | Yes | No | Unknown | Unknown |
Telegram | GPLv2 (partially) | In-house development (optional) | In-house development | Optional | Unknown | Optional | Yes | Client-server encrypted only | Yes | Yes | No | No |
Threema | crypto library only | NaCl library | TLS / SSL | Yes | No | Server client only | Yes | Yes | Yes | Optional, their hashes | No | No |
Tigase Messenger | AGPL | Unknown | Unknown | Yes | Unknown | Unknown | Yes | Yes | Unknown | No | Yes (XMPP) | Yes |
TextNow | No | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Yes | Unknown | Unknown |
Viber | No | No | Unknown | Unknown | Unknown | Unknown | Yes | Unknown | Unknown | Yes | No | No |
No | only from version 2.16.14 | In-house development | Yes | Yes | Yes | Yes | only from version 2.16.14 | Yes | Yes | No | No | |
Wickr | No | In-house development (AES256, ECDH521, RSA4096) | TLS / SSL | Unknown | Unknown | Unknown | Yes | Unknown | Unknown | Unknown | Unknown | Unknown |
Wire | GPL | Proteus, Double Ratchet Algorithm, WebRTC ( DTLS ) and SRTP for calls | TLS | Yes | Yes | Yes | Yes | Yes | Yes | Optional, their hashes | Yes | No |
Xabber | GPLv3 | OTR (optional) | TLS | Yes | Yes | Yes | Yes | Client-server encrypted only | Only unencrypted | No | Yes (XMPP) | Yes |
Supported Platforms
The following table shows which messenger apps are supported by which operating systems.
Messenger | Android | iOS | Windows Mobile / Phone | BlackBerry | Symbian | Windows | macOS | Linux | Web | Other platforms | Info booth |
---|---|---|---|---|---|---|---|---|---|---|---|
Bleep | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
Blackberry Messenger | from 2.3 | from 6 | from 8 | OS 5 | No | No | No | No | No | BlackBerry Tablet OS 1 | December 2017 |
BLACKPIN | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
ChatSecure | No | Yes | No | No | No | No | No | No | No | further development for Android has been discontinued | December 2017 |
Chiffry | Yes | Yes | Yes | Yes | No | No | No | No | No | December 2017 | |
cameoNet | Yes | No | No | No | No | No | No | No | No | December 2017 | |
Conversations | from 4.4 | No | No | No | No | No | No | No | No | December 2017 | |
Delta chat | Yes | Yes | No | No | No | Yes | Yes | Yes | Yes | Can also be used with Mailvelope or unencrypted via the web interface | December 2017 |
FriendCaller | Yes | Yes | No | No | No | No | No | No | Yes | Java, Nokia S40 | December 2017 |
Hike | from 2.3 | Yes | No | No | No | No | No | No | No | December 2017 | |
Hoccer | from 4.0 | Yes | No | No | No | No | No | No | No | December 2017 | |
ICQ | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Java | December 2017 |
IM + | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes | Java | December 2017 |
Jami | Yes | Yes | No | No | No | Yes | Yes | Yes | No | Java | December 2017 |
Jongla | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
KakaoTalk | Yes | Yes | No | No | No | Yes | Yes | No | No | December 2017 | |
Kik | Yes | Yes | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | Unknown | June 2019 | |
Kontalk | Yes | No | No | No | No | Yes | Yes | Yes | No | Platform-independent Java desktop client | December 2017 |
Line | Yes | Yes | Yes | † July 3rd, 2017 | No | Yes | Yes | No | No | Chrome | December 2017 |
OneTime Messenger | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
Rainbow | Yes | Yes | No | No | No | Yes | Yes | No | Yes | December 2017 | |
Riot | from 4.1 | from 8.0 | No | No | No | Yes | Yes | Yes | Yes | Uses the platform-independent matrix protocol | December 2017 |
SecureChat | Yes | No | No | No | No | No | No | No | No | December 2017 | |
For sure | Yes | Yes | Yes | No | No | No | No | No | No | December 2017 | |
signal | from 4.0 | from 8.0 | No | No | No | Yes | Yes | Yes | No | Chrome, Ubuntu Touch | December 2017 |
SIMSme | from 4.0 | from 8.0 | No | No | No | No | No | No | No | December 2017 | |
Skype | from 4.0.4 | from 10 | > 10 | Discontinued | Discontinued | from Windows 7 | from X 10.10 | 64-bit versions | Yes | Skype-enabled phones, Xbox One, PlayStation Vita | June 2020 |
SureSpot | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
Telegram | from 4.1 | from 9 | Yes | unofficially | No | Yes | Yes | Yes | Yes | Firefox OS, Ubuntu Touch , Linux Commandline, Sailfish OS | June 2020 |
Threema | from 4.0 | Yes | † June 30th, 2020 | No | No | No | No | No | Yes | Web (Web only if the smartphone belonging to the account has an Internet connection with Threema) | July 2020 |
Tigase Messenger | Yes | Yes | No | No | No | No | No | No | No | December 2017 | |
Viber | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | No | December 2017 | |
from 2.1 | Yes | † December 31, 2019 | † December 31, 2017 | Yes | Yes | Yes | No | Yes | Nokia S40 (until 31.12.2018), web (web only if a supported smartphone with WhatsApp is connected to the internet at the same time) | December 2017 | |
Wickr | Yes | Yes | No | No | No | Yes | Yes | Yes | No | December 2017 | |
Wire | from 4.2 | from 8.0 | No | No | No | Yes | Yes | Yes | Yes | December 2017 | |
Xabber | Yes | No | No | No | No | No | No | No | Yes | December 2017 |
Notes on the individual columns
Free software
This column provides information on whether the software is made available to the end user under a free or open source license . For applications where security and trust are paramount, viewing the source code is essential to ensure independent control. In contrast to this, there is proprietary software , in which the source text is normally not released and thus security through obscurity prevails, for example .
Encryption
Some messengers offer the transmission of encrypted messages. These columns provide information about which encryption technology or which encryption protocol is used and which special properties are supported.
Further details on the technology of individual messengers can be found in the respective notes below.
End-to-end encryption
When a message is encrypted before it is sent and only decrypted by the recipient, this is known as end-to-end encryption . The message remains illegible on the entire transport route.
Some messengers use new encryption protocols that were specially designed for mobile instant messaging. However, such new protocols are practically never free of errors straight away. The "end-to-end" field of messengers who use new, unchecked encryption protocols is highlighted in yellow in the table. This shows that the security of these messengers has not yet been checked and probably still contains errors.
While security flaws in open source software are generally discovered and corrected quickly because the source code can be checked by many experts, this is not the case with proprietary software. The “end-to-end” field of proprietary messengers is highlighted in red because they cannot be considered secure in the foreseeable future.
Some messengers use encryption protocols that have been in use for some time and have already been checked many times. The "end-to-end" field of these messengers has a green background to show that they offer a high level of security.
The "end-to-end" column uses the following classification:
- None : The messenger does not support encryption. The field is highlighted in red.
- In-house development: The process was designed by the manufacturer himself. Depending on whether it was checked and what the check revealed, the field is highlighted in green (can be considered safe), yellow (no check) or red (security deficiencies have been found).
- Standard procedures Standardized procedures ( OTR , TLS ) are used. The field has a green background.
Client-server encryption
Mobile instant messaging usually involves one or more servers that receive messages, store them temporarily and - immediately or later - deliver them to the recipient. Communication between a client and a server can be encrypted (so-called transport encryption ). In this case, messages cannot be read during transmission from the client to the server or vice versa, but the messages are in clear text on the server. Whether the connection between two servers is encrypted cannot be influenced by the client (here: the messenger) and is therefore not taken into account.
The TLS protocol is normally used for client-server encryption . Some messengers use the outdated SSL protocol or in-house developments.
The "Client-Server Encryption" column uses the following classification:
- None : The messenger does not support encryption. The field is highlighted in red.
- In-house development: The process was designed by the manufacturer himself. Depending on whether it was checked and what the check revealed, the field is highlighted in green (can be considered safe), yellow (no check) or red (security deficiencies have been found).
- Standard procedures Standardized procedures (OTR, TLS) are used. The field has a green background.
Authentication
There are cryptographic methods with which the authenticity of a message can be checked, i.e. H. whether it actually comes from the sender it appears to come from. In this way, man-in-the-middle attacks can be detected.
This column provides information about whether the respective messenger supports the authentication of messages.
Deniability
If the authenticity of messages can be checked (see column "Authentication"), it is usually possible to subsequently assign messages to the sender without any doubt. It can then be proven that the sender actually sent certain messages.
Some messengers offer the option of subsequently credibly denying the sending of a message . The recipient can still be sure that the message is genuine at the moment it is received.
Both the proof of authenticity at the moment of receipt and the later contestability of authenticity are implemented using cryptographic processes.
Perfect Forward Secrecy (PFS)
If all messages are encrypted with the same cryptographic key, this key can also be used to subsequently decrypt older messages. If an attacker gains access to the key, he can also read messages intercepted earlier.
Some messengers offer perfect forward secrecy , which prevents this scenario by encrypting every message with a new short-term key that is derived from a long-term key and is deleted within a short time.
Functions
Picture messages
Indicates whether the messenger supports the sending of picture messages.
Group chat
Some messengers support group communication. Individual users can become members of a group. Messages sent to the group are delivered to all members of that group.
The “Group chat” column provides information on whether the respective messenger supports this type of communication.
Asynchronous communication
Asynchronous communication (or “offline communication”) is used when messages can be sent while the recipient is not online, i.e. cannot receive any messages. The messages are cached on a server until the recipient is ready to receive the messages. The messages can also be received even if the sender is no longer online.
This property is particularly useful in mobile use, since mobile devices usually do not have a constant Internet connection.
Others
Transmission of the connection data
Many messengers use Internet server services from Google (Google Cloud Messaging, now Firebase Cloud Messaging) or Apple. As a result, these companies receive the meta or connection data of the communication. According to secret services and data protection agencies, metadata is at least as intimate or dangerous as content data. A participant acting under a pseudonym can be identified by metadata. Only the content of a message is hidden by the messenger encryption that is sometimes offered here.
Transfer of contacts
Specifies whether the messenger automatically transfers all phone book entries from the mobile phone to the provider in order to facilitate communication with its own contacts. However, this makes it possible for the provider to create social profiles by linking the contact details.
- Optional : You can choose whether the phone book should be transferred (green)
- No : Phonebook is not transferred (yellow)
- Their hashes : only hashes of the contact data are transmitted (yellow)
- Yes : the phone book is transferred automatically (red)
Self-hosted server
This column indicates whether it is possible for third parties to host a server for the operation of the messenger themselves.
Federation
The column indicates whether accounts on different servers can communicate with each other.
Notes on the individual messengers
Bleep
- Bleep uses decentralized distributed servers (P2P).
ChatSecure
- The transmission of images takes place (optionally OTR-encrypted) via the chat channel.
- An XMPP account is required, which - depending on the server - can be created directly in the app. Alternatively, the client works with any account that was previously created in the browser.
Chiffry
- End-to-end data encryption of all messages and telephone calls with 256-bit AES in GCM mode.
- The encryption key is generated anew before each message or each telephone call and transmitted to the recipient according to the mailbox principle using elliptical curve cryptography (512-bit ECDH).
- Protection against forgery of all messages by means of 512-bit ECDSA signatures and user identification by means of cipher certificates.
- Data is transmitted via the Chiffry communication server, which is located in the envia TEL data center in Germany.
- The basic version is free and includes all basic functions such as encrypted sending of text and voice messages, images, videos, locations, contacts and tap-proof telephony.
- Business version is designed for authorities and companies and includes special solutions such as B. Communication via its own Chiffry server within an authority or company.
Conversations
- Completely open source
- XMPP client that works with any server for free. A user can also create an account with Conversations for a fee.
- End-to-end encryption
- Can also be installed via F-Droid
Delta chat
- A valid e-mail address is sufficient for use
- There is no central server
- The messages are encrypted using Autocrypt ( openPGP )
- The use of transport encryption (TLS) depends on the email provider used
- Communication with other e-mail programs is possible without restriction
- Any attachments can be sent encrypted
- Completely open source
- Can also be installed via F-Droid
Hike
- The transmission of content (text, images, etc.) can optionally be encrypted within a WI-FI connection with 128-bit SSL.
Kontalk
- The protocol used is XMPP, which is supplemented with its own extensions.
- As standard, asymmetric encryption using OpenPGP is used: All messages are end-to-end encrypted and signed.
Line
- Line is an instant messaging service by the Japanese company Line Corporation, part of the Korean Naver Corporation.
- The app is available in eighteen languages.
- Line is the most popular messaging application in Japan. Line is also popular in Taiwan, Thailand, Turkmenistan, and Indonesia, and had 700 million users worldwide in 2017.
- The program can be used to make free VoIP calls and send messages.
- Line offers a range of extra services such as Line Friends, Line Pay, Line Taxi, Line Wow, Line Man, Line Today, Line TV and Line Shopping.
signal
- The apps and the server are published under a free license (GPLv3, AGPLv3) as open source software on Github.
- Whistleblower and former CIA employee Edward Snowden recommended Signal Messenger several times and, according to his own statements, uses it every day.
- All communication with other signal users (messages, phone calls, group chats) is automatically encrypted end-to-end. The keys for encrypting communication are stored on the end devices (not on the server).
- The signal encryption protocol is a further development of OTR in order to enable an asynchronous use of this protocol. In the meantime, Whatsapp, Facebook Messenger, Skype and others also use the signal encryption protocol.
- One of the two Whatsapp founders (Brian Acton) left Whatsapp and donated $ 50 million to the Signal Foundation in 2018.
- A desktop version exists. Sent and received messages are synchronized with all devices.
- Registration only with telephone number.
- Location sharing not with OpenStreetMap, as one would expect, but with Google.
SureSpot
- The authentication is ensured by public key cryptography. The server signs the public keys of all clients. A client checks the public key of its communication partner by checking the signature of the server. The server signature is built into the client (it should therefore not be possible to operate your own server). The server thus acts as a de facto certification authority.
- Users cannot check each other's public keys. The keys can be seen, so that a comparison would be possible. However, a user can generate new keys at any time without the attention of other users.
- Users reported sometimes extremely long delivery times (up to 8 hours).
Telegram
- Telegram uses its own protocol (MTProto), which also regulates the use of cryptography.
- Registration only with a telephone number, then use optionally with a user name.
- The group chat does not offer end-to-end encryption, only client-server or server-client.
- End-to-end encryption is available in “secret chats” that have to be started manually.
- The "MTProto" protocol used by Telegram is an in-house development and has been criticized for various reasons, see section Security
- All messages except for "secret chats" are stored centrally on the Telegram servers and synchronized between the user's end devices.
Threema
- Threema was originally developed by the Swiss company Kasper Systems GmbH (later Threema GmbH ). The servers are in Switzerland. At the same time, the push service of the respective operating system manufacturer (e.g. Google Cloud Messaging) is used as standard, with no message content or metadata being sent about it, only the information that a message has arrived. Threema can also be installed and used without a Google account.
- Registration is also possible without a telephone number and email address.
- Threema lets the user decide whether he wants to upload his entire phone book to the server or just individual contacts. The automatic contact synchronization can also be controlled.
- The University of Amsterdam subjected Threema to a basic security analysis. For this purpose, the binary code was decompiled , the data management was analyzed and the communication via man-in-the-middle was attacked. No gaps were found, the authors of the study therefore consider Threema to be well implemented and safe.
- In November 2015, the program was audited by cnlab security AG, an IT security service provider from Switzerland, and found to be secure.
- Without open source code, however, it cannot be determined whether Threema has become less secure or even insecure through later updates (e.g. through backdoors). The tests can therefore only certify the security of the tested version.
- WhatsApp is very popular.
- WhatsApp encrypts the connection with end-to-end encryption (since April 2016, according to the manufacturer).
- WhatsApp's source code is not available for public review.
- The WhatsApp Messenger transfers its users' phone and address books to WhatsApp and Facebook.
- Registration with telephone number
- WhatsApp belongs to Facebook .
Wickr
- Wickr promises "military-grade encryption". The Android app uses AES 256 bit, ECDH 521 , RSA-4096 and TLS for encryption .
Wire
- The source code of the clients is available on GitHub . Since the beginning of April 2017, the source code of the server has also been gradually published on GitHub.
- for smartphones and tablets (Android or iOS) as well as Windows, macOS and Linux computers.
- WebRTC possible with certain web browsers ( Chrome , Firefox and Opera ).
- free for private use
- All communication content on Wire is end-to-end encrypted.
Xabber
- An iOS version was last announced on February 5, 2013.
- An XMPP account is required which cannot be created by Xabber.
Messenger that is no longer maintained
- myEnigma used end-to-end encryption (AES 256 bit) of the messages between the sending and receiving devices and additional TLS encryption of the data on the way to and from the server. The operator was the Swiss company Qnective, the server was located in Switzerland. The service was discontinued in 2016.
- sayHEY existed from 2014 to 2017. The free and cross-platform app ran on smartphones and desktops and was developed and operated by Simyo .
- Whistle.im
See also
Web links
- Security and sustainability of WhatsApp, E-Mail, SMS & Co. digital-gesellschaft.ch compares 19 instant messengers (11/2016)
- "Secure Messaging Scorecard" of the Electronic Frontier Foundation (English, obsolete)
Individual evidence
- ↑ Bittorrent Labs: bleep ( English ) In: bittorrent.com . Archived from the original on October 8, 2014. Retrieved October 11, 2014.
- ↑ a b c d e WhatsApp and alternatives - data protection in the test . In: test.de . February 26, 2014. Retrieved December 23, 2015.
- ↑ Prodekted Mobile Teamwork ( English ) In: blackpin.de . Retrieved February 25, 2019.
- ↑ About ( English ) In: chatsecure.org . Retrieved December 23, 2015.
- ↑ Security: Experts warn against WhatsApp alternative Hike . In: spiegel.de . Spiegel Online . December 10, 2012. Accessed December 23, 2015.
- ↑ a b c Hoccer - Data protection and security declaration . In: hoccer.com . Retrieved December 23, 2015.
- ↑ ICQ Video chat & Messenger - Android app . In: chip.de . May 5, 2014. Accessed December 23, 2015.
- ↑ Jami: Frequently Asked Questions ( English ) In: jami.net . Retrieved April 9, 2020.
- ↑ KakaoTalk Bypassing SSL (2) ( English ) In: bpak.org . June 23, 2011. Accessed December 23, 2015.
- ↑ Kontalk Messenger - Apps on Google Play . In: play.google.com .
- ↑ riot-web / LICENSE ( English ) In: github.com . Riot.im. Retrieved January 3, 2018.
- ↑ Security . In: riot.im . Retrieved January 3, 2018.
- ↑ advanced cryptographic ratcheting . In: whispersystems.org . November 26, 2013. Retrieved December 23, 2015.
- ↑ Markus Beckedahl: Encrypted Whatsapp alternative: New version of Textsecure offers group chat . In: netzpolitik.org . February 25, 2014. Accessed December 23, 2015.
- ↑ a b WhisperSystems / TextSecure server . In: github.com . Retrieved December 23, 2015.
- ↑ Security . In: sims.me . German Post AG. Archived from the original on August 19, 2014. Retrieved December 23, 2015.
- ↑ Ronald Eikesberg: SIMSme: crypto messenger from Deutsche Post . In: heise.de . August 13, 2014. Retrieved April 17, 2017.
- ↑ Frequently asked questions . In: threema.ch . Retrieved December 23, 2015.
- ↑ Hristo Dimitrov, Jan Laan, Guido Pineda: threema security assessment - Research project for Security of Systems and Networks Master System and Network Engineering (PDF): os3.nl . Retrieved December 23, 2015.
- ↑ Frequently asked questions - Threema . In: threema.ch .
- ↑ Tigase Messenger ( English ) In: f-droid.org . F-droid.
- ↑ Privacy Policy . In: touch.com . Archived from the original on February 27, 2014. Retrieved on December 23, 2015.
- ↑ WhatsApp's Signal Protocol integration is now complete . In: whispersystems.org . Open Whisper Systems. April 5, 2016. Retrieved June 15, 2016.
- ↑ Tap-proof: WhatsApp receives end-to-end encryption . In: computerbase.de . November 18, 2014. Accessed December 23, 2015.
- ↑ Signal >> Blog >> Advanced Cryptographic Ratcheting . In: www.whispersystems.org .
- ↑ wireapp / wire-server ( English ) In: github.com . Wire Swiss GmbH. Retrieved July 27, 2020.
- ↑ Xabber is released under GNU GPL v3 (30-01-13) In: xabber.com . Retrieved December 23, 2015.
- ↑ Frequently Asked Questions ( English ) In: chatsecure.org . Retrieved December 5, 2017.
- ↑ desktopclient-java - Releases ( English ) In: github.com . Retrieved December 23, 2015.
- ↑ uApp Explorer TextSecure Client ( English ) In: uappexplorer.com . Retrieved on February 28, 2016. ( Page no longer available , search in web archives )
- ↑ a b c d e What are the system requirements for Skype? . In: skype.com . Skype Communications SARL. Accessed June 1, 2020.
- ↑ a b c Which Skype-enabled devices or platforms are no longer supported? . In: skype.com . Skype Communications SARL. Accessed June 1, 2020.
- ↑ a b Which end devices are supported? . In: telegram.org . Accessed June 1, 2020.
- ↑ jollagram OpenRepos ( English ) In: openrepos.net . June 23, 2015. Retrieved February 28, 2016.
- ↑ a b Bruce Schneier: Crypto-Gram - Secrecy, Security, and Obscurity ( English ) In: schneier.com . Bruce Schneier, Founder and CTO Counterpane Internet Security, Inc. May 15, 2002. Retrieved December 23, 2015.
- ↑ ABC News: Ex-NSA Chief: 'We Kill People Based on Metadata' ( English ) In: ABC News . Archived from the original on September 1, 2016. Retrieved August 31, 2016.
- ↑ get.chiffry.de . In: chiffry.de .
- ↑ 128 bit SSL Encryption: hike ( English ) In: hike.in . Retrieved on December 23, 2015. ( Page no longer available , search in web archives )
- ↑ Signal Messenger source code ( English ) In: github.com . GitHub Inc.
- ↑ Simplifying OTR deniability. ( English ) In: whispersystems.org . July 27, 2013. Accessed December 23, 2015.
- ↑ Signal Desktop ( English ) In: github.com . GitHub Inc. Retrieved March 23, 2018.
- ↑ Contact . In: threema.ch . Threema GmbH. Retrieved December 23, 2015.
- ↑ Can I buy / use Threema without a Google Account? . In: threema.ch . Threema GmbH. Retrieved August 31, 2016.
- ↑ Hristo Dimitrov, Jan Laan, Guido Pineda: threema security assessment - Research project for Security of Systems and Networks Master System and Network Engineering ( English , PDF): os3.nl . December 22, 2013. Accessed December 23, 2015.
- ↑ Dennis Schirrmacher: Threema audit completed: “End-to-end encryption without weaknesses”. . In: heise.de . Heise online . November 3, 2015. Retrieved November 3, 2015.
- ↑ Internet: Facebook buys rival WhatsApp . In: zeit.de . The time . February 20, 2014. Accessed December 23, 2015.
- ↑ Ms. Smith: Wickr: Free texting app has military-grade encryption, messages self-destruct ( English ) In: wickr.com . September 17, 2013. Archived from the original on December 31, 2014.
- ↑ Wire clients ( English ) In: github.com . Wire Swiss GmbH.
- ↑ Wire-Server ( English ) In: github.com . Wire Swiss GmbH.
- ↑ Ferdinand Thommes: Instant Messenger Wire reveals server sources . In: pro-linux.de . Pro Linux . April 12, 2017.
- ↑ Andrew Nenakhov: Xabber - Question concerning pull requests ( English ) In: xabber.com . February 5, 2013. Archived from the original on April 22, 2013. Retrieved on December 23, 2015: “GNU GPLv3 is incompatible with Apple Appstore terms and we'll definitely have to think of something similar to solve this problem when we release Xabber for iOS (wich we plan to later this year, btw, work is already in process). "