* removed connection established message, apps can send that themselves (yam util does)
|12 months ago|
|src||12 months ago|
|tests||12 months ago|
|.gitignore||1 year ago|
|.travis.yml||1 year ago|
|CHANGELOG.md||12 months ago|
|LICENSE||1 year ago|
|Makefile||1 year ago|
|README.md||12 months ago|
|dummy.png||1 year ago|
|logo.png||12 months ago|
|no-dummy.png||1 year ago|
|requirements.in||1 year ago|
|requirements.txt||1 year ago|
|run_tests.sh||1 year ago|
|setup.cfg||1 year ago|
|setup.py||12 months ago|
Only you and the person you're talking to should know the details of the conversation. This includes metadata.
This is a Python library to share data anonymously and securely* with limited traffic metadata. It is designed for generic byte streaming over a private tunnel, using Tor onion services..
This library is meant to be used by other libraries or applications, however a script 'yam' is included to enable basic CLI instant messaging.
* The ID one connects to a host with must be shared via a secure (private, authenticated) channel.
$ pip install youandme
You also need a recent Tor daemon in executable path. 0.4 Tor is what is tested. https://www.torproject.org/download/tor/
$ yam.py host
This will start a bare-bones CLI-based chat and output an address to be given to a friend.
The friend connects:
$ yam.py conn --address <address>
In normal socket connections, Eve can see when Alex and Bob communicate and the size of their communications.
This library sends continuous streams of data (null bytes) even when no information is being communicated, in order to increase unobservability of transmission times and packet sizes.
Anonymity and encryption is provided via Tor onion services, though this library could easily be adapted to use plaintext (and encryption by an application) or another relay like I2P.
As stated above, this library does no authentication. However, if the ID is shared privately and safely, the tunnel will have roughly the security of a Tor v3 onion service, with increased metadata unobservability.
That said, one should not rely on any software when the stakes are too high.
This project will forever follow the KISS principle, but these two three will be addressed.