[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle
#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--------------------------------------+-------------------------------------
Reporter: kaepora | Owner: erinn
Type: enhancement | Status: new
Priority: normal | Milestone: TorBrowserBundle 2.2.x-stable
Component: Tor bundles/installation | Version: Tor: unspecified
Keywords: | Parent:
Points: | Actualpoints:
--------------------------------------+-------------------------------------
Comment(by kaepora):
Replying to [comment:10 ioerror]:
> Replying to [ticket:7085 kaepora]:
>
> > Cryptocat is a browser extension available for Firefox that provides
an in-browser XMPP client capable of handling Off-the-Record encrypted
conversations as well as multi-party encrypted conversations. Cryptocat is
free software, implements open standards and is developed by the Cryptocat
Project (https://project.crypto.cat). It has been rigorously tested for
compatibility with the Tor Browser bundle under Windows, Linux and Mac.
> >
>
> What tests were done? What kind of stuff are you testing or trying to
assert?
>
I simply got together with a friend and we had conversations on Cryptocat
over TBB on Windows, Mac and Linux. We tried conversations with up to 5
participants, private messaging, and checked to see what happened if a TBB
idled for about an hour. Performance was good on all accounts, if
sometimes slow.
What I'm trying to assert is that Cryptocat seems to work reliably over
the Tor network for the standard end-user.
>
>
> >
> > I believe Cryptocat should be integrated into the Tor Browser Bundle
for the following reasons:
> >
> > * Cryptocat can offer integrated OTR encrypted messaging immediately
to anyone who downloads the Tor Browser Bundle.
> >
> >
>
> How does it work? Does it connect to crypto.cat? Or to another server?
Or a list of servers?
By default it connects to the XMPP-BOSH server at crypto.cat. However,
Cryptocat supports custom servers (easily changeable in the client's login
screen), and we even provide instructions on how to set up your own XMPP-
BOSH server for Cryptocat at our wiki:
https://github.com/kaepora/cryptocat/wiki/Server-Deployment-Instructions
>
>
> > * Cryptocat is easy to use and is translated to more than 22
languages. It provides an accessible alternative that is likely to
encourage Tor Browser Bundle users to avoid risking their anonymity, by
using Cryptocat (OTR over Tor/HTTPS) instead of Facebook Chat or Google
Talk (Plaintext over Tor/Uncertain HTTPS).
> >
> >
>
> Both Facebook and Google Talk use HTTPS in the Tor Browser as we ship
HTTPS-Everywhere.
I guess that is true.
>
>
> > Cryptocat's inclusion into the Tor Browser Bundle benefits Tor users
and Tor developers by bundling a one-click access to private Instant
Messaging. It is likely to shift Tor Browser Bundle users from using
untrustworthy, commercial services to using a free software platform which
has privacy as a priority and a history of responsible responsiveness to
feedback.
> >
> >
>
> But what service will they use now? Will this mean all TBB users will
join chats on your server?
That's a bit hyperbolic - TBB users will be given the option to use
Cryptocat to either use Cryptocat's default server or specify any custom
server they wish. They are also still capable of using other services such
as Google Talk.
Let's keep the conversation going - I am excited about satisfying your
questions and making progress on this issue! :-)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7085#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs