Briar is a messaging app designed for high-security and censored environments. It uses peer-to-peer encryption, meaning messages are exchanged directly between devices rather than through a central server. This decentralized approach eliminates single points of failure and surveillance. Briar can connect directly via Bluetooth or Wi-Fi in proximity, or through the Tor network for more distant contacts, further enhancing privacy. Users add contacts by scanning a QR code or sharing a link. While Briar prioritizes security, it also supports blogs and forums, fostering community building in challenging situations.
Ricochet is a peer-to-peer encrypted instant messaging application that uses Tor hidden services for communication. Each user generates a unique hidden service address, eliminating the need for servers and providing strong anonymity. Contacts are added by sharing these addresses, and all messages are encrypted end-to-end. This decentralized architecture makes it resistant to surveillance and censorship, as there's no central point to monitor or control. Ricochet prioritizes privacy and security by minimizing metadata leakage and requiring no personal information for account creation. While the project is no longer actively maintained, its source code remains available.
HN commenters discuss Ricochet's reliance on Tor hidden services for its peer-to-peer architecture. Several express concern over its discoverability, suggesting contact discovery is a significant hurdle for wider adoption. Some praised its strong privacy features, while others questioned its scalability and the potential for network congestion with increased usage. The single developer model and lack of recent updates also drew attention, raising questions about the project's long-term viability and security. A few commenters shared positive experiences using Ricochet, highlighting its ease of setup and reliable performance. Others compared it to other secure messaging platforms, debating the trade-offs between usability and anonymity. The discussion also touches on the inherent limitations of relying solely on Tor, including speed and potential vulnerabilities.
Summary of Comments ( 131 )
https://news.ycombinator.com/item?id=43363031
Hacker News users discussed Briar's reliance on Tor for peer discovery, expressing concerns about its speed and reliability. Some questioned the practicality of Bluetooth and Wi-Fi mesh networking as a fallback, doubting its range and usability. Others were interested in the technical details of Briar's implementation, particularly its use of SQLite and the lack of end-to-end encryption for blog posts. The closed-source nature of the Android app was also raised as a potential issue, despite the project being open source overall. Several commenters compared Briar to other secure messaging apps like Signal and Session, highlighting trade-offs between usability and security. Finally, there was some discussion of the project's funding and its potential use cases in high-risk environments.
The Hacker News post titled "Briar: Peer to Peer Encrypted Messaging" linking to Briar Project's "how it works" page generated a moderate amount of discussion, with several commenters expressing interest in the project and its technical aspects.
A recurring theme is Briar's unique approach to peer-to-peer communication, which avoids relying on central servers. Several comments delve into the specifics of this, comparing it to other messaging apps like Signal and Session. One commenter points out that Briar "uses Bluetooth and wifi-direct for local communication" when internet connectivity is unavailable, distinguishing it from apps that rely solely on internet access. Another commenter elaborates on this, explaining how this feature enables communication in "challenging network environments" like protests or areas with internet censorship.
The discussion also touches on the trade-offs of this decentralized approach. A commenter highlights the "higher barrier to entry" due to the need for direct connections or a trusted contact already on the network, contrasting it with the ease of joining centralized platforms. Another acknowledges the potential difficulty in discovering and adding contacts.
Security and privacy are also prominent in the discussion. Commenters discuss the encryption methods employed by Briar and its resistance to surveillance. One commenter inquires about metadata leaks, specifically regarding "Bluetooth broadcast device names," raising concerns about potential identification even with encrypted messages.
Furthermore, the conversation drifts towards the practical usability of Briar. Commenters discuss its interface and user experience, with some expressing a desire for a more polished design. The limited platform support (Android only at the time of the comments) is also mentioned. A commenter expresses interest in iOS and desktop support, indicating a demand for broader accessibility.
Finally, some comments provide additional context, mentioning related projects like Ricochet Refresh and the challenges of building truly decentralized and secure communication systems. One commenter mentions the historical precedent of "sneakernet" as a precursor to Briar's approach.
In summary, the comments section demonstrates a significant interest in Briar's decentralized approach to secure messaging, while also acknowledging the practical challenges and trade-offs involved. The discussion focuses heavily on the technical aspects, comparing Briar to existing solutions and exploring its potential use cases in situations where traditional communication channels are unavailable or compromised.