Not a member yet? Why not Sign up today
Create an account  

Tox Messenger: Distributed Secure messenger with audio & video chat capabilities

Thumbs Up 
[Image: 3QCbArsg.jpg]

Tox began a few years ago, in the wake of Edward Snowden’s leaks regarding NSA spying activity. The idea was to create an instant messaging protocol that ran without any kind of central servers. The system would be distributed, peer-to-peer, and encrypted end-to-end, with no way to disable any of the encryption features; at the same time, the protocol would be easily usable by the layperson with no practical knowledge of cryptography or distributed systems. Work began during the Summer of 2013 by a single anonymous developer (who continues, to this day, to remain anonymous). This lone developer put together a library implementing the Tox protocol. The library provides all of the messaging and encryption facilities, and is completely decoupled from any user-interface; for an end-user to make use of Tox, they need a Tox client. Fast-forward a few years to today, and there exist several independent Tox client projects, and the original Tox core library implementation is nearing completion (in terms of features). Tox (both core and clients) has thousands of users, hundreds of contributors, and the project shows no sign of slowing down. Recently, a group of some of the project’s major contributors have formed The Tox Project, an organization built around the protection, promotion, and advancement of Tox and its development.

Distributed FOSS Secure messenger with Audio and Video chat capabilities

[Image: utox.png?w=400&tok=1183ef][Image: antidote.png?w=400&tok=5149fd][Image: toxic.png?w=400&tok=505cd8][Image: qtox.png?w=400&tok=63162f]

Which encryption algorithms does Toxcore employ?

Tox uses the cryptographic primitives present in the NaCl crypto library, via libsodium. Specifically, Tox employs curve25519 for its key exchanges, xsalsa20 for symmetric encryption, and poly1305 for MACs.

Does Tox leak my IP address?

Tox makes no attempt to cloak your IP address when communicating with friends, as the whole point of a peer-to-peer network is to connect you directly to your friends. A workaround does exist in the form of tunneling your Tox connections through Tor. However, a non-friend user cannot discover your IP address using only a Tox ID; your IP address will only be discernible when you accept/send a friend request, and add a user to your contacts list.

Does Tox rely on central servers?

No. That said, in some situations a client will choose to use publicly listed bootstrap nodes to find their way into the DHT.

How does Tox protect my privacy?

Tox protects your privacy by:
  •     Removing the need to rely on central authorities to provide messenger services
  •     Concealing your identity (in the form of meta-data, e.g. your IP address) from people who are not your authorized friends
  •     Enforcing end-to-end encryption with perfect forward secrecy as the default and only mode of operation for all messages
  •     Making your identity impossible to forge without the possesion of your personal private key, which never leaves your computer

What codecs does Toxcore use for audio and video?

  • Opus for audio, and VP8 for video.
  • Tox does not make use of SIP.

How do I add someone to my contacts list?

Look in the profile or settings panel of your client to get your Tox ID which should look something like:


Give yours to your friend and get your friend to add it. That’s it.

     If you want a shorter and more memorable ID, you can use a service like ToxMe, that maps an email-address-style username to a Tox ID. However, an individual concerned about their security should avoid using these services where possible. Unfortunately, the cost of this convenient name-to-Tox ID mapping is a loss of decentralization. You must trust that the entity running the service is serving you (and others looking for you) accurate information. If you’re not careful, you may be subject to MITM attacks.

Where can I find a public DHT node to bootstrap with?

Check out our public nodes list for an updated list, including machine-readable JSON output.

What is stopping people from tracking me through the public DHT?
Tox generates a temporary public/private key pair used to make connections to non-friend peers in the DHT. Onion routing is used to store and locate Tox IDs, to make it more difficult to, for example, associate Alice and Bob together by who they are looking for in the network.

How to run a Bootstrap Node?


Assuming that Toxcore has already been built, cd to


and run

Quote:./DHT_bootstrap ADDRESS PORT KEY

Change ADDRESS, PORT, and KEY to that of any active DHT node.


Daemonized version

Toxcore also has a daemonized version of the bootstrap node code wish can be used on SystemV init or systemd init systems.  You first need to configure tox to build the bootstrap node executable. Run the configure script with


as an argument. The tox_bootstrap_daemon executable will be placed in


so grab a copy from there and place it where you want the daemon to run from.

Configuring Daemon script

Note that the following instructions might be out of date and it’s preferable to read the file maintained by the daemon developer.

Next we need to configure


Set the NAME, USER, CFG, PIDFILE and SCRIPTNAME arguments as per your installation.

Quote:Option               Description
NAME                 Name of the executable (default is the tox_bootstrap_daemon)
USER                  Name of the user the daemon will run as (e.g. tox)
CFG                    Location of configuration file
PIDFILE              Where to create the pid file for the daemon
SCRIPTNAME     Path to the (used to change name of the script)

There are a few other options generated by a combination of these items, and you may wish to customize them for your needs.

Configuring the daemon itself

Now we need to configure the conf file that the daemon uses, located in


At minimum you need to set the keys_file_path, pid_file_path and add some bootstrap nodes.

Quote:keys_file_path : The path to your keys file that will store the keypair for your daemon
pid_file_path :The path to the pid file and should be set based on what you chose for PIDFILE earlier

To get the bootstrap nodes, you can either grab them from here or use an updater script – some options here: issue

Generate the service

Place the daemon script in


and rebuild the service list.
Finally, start the service!


ToxDNS is a tox ID-to-name mapping service. It allows users to shorten their regular, somewhat long, Tox IDs, with short and readable IDs, that closely resemble the format of an email address. An example of a ToxDNS service in use is, Which when added, resolves to the full ID (78A1ADE4B65B86BCD51CC73E2CD4E542179F47959FE3E0E21B4B0ACDADE51855D34D34D37CB5).

ToxDNS servers are federated, they are each run by their individual operators and their databases are stored online. This can, but doesn’t necessarily, compromise your privacy, but really it’s simple to minimize the risk so that it’s nearly nonexistent.

What you might want to know about ToxDNS ?

Some people have some concerns about how ToxDNS services could be used maliciously, mismanaged, or exploited as a single point of failure in order to deny a person the ability to look up the ID they want. Hopefully I can address those concerns here.

Impersonating a user(MITM) by switching the Tox ID associated with the username: If someone compromised your account on a ToxDNS Service or a server hosting ToxDNS records, they might be able to replace the Tox ID associated with the username. New users looking up a Tox ID using the compromised username would be directed to the wrong Tox ID. To minimize the chance of such a thing occurring, use a long, unique, random password for your ToxDNS account, and set the ID to be unchangable if the server supports it. This will not connect you with your intended friend and it does not give anyone access to your private key or any current or previous chat sessions keys.

Malicious Service Operator gathering metadata on Tox ID’s as they are registered: A malicious site operator could keep some information about the users of the ToxDNS service as they register by retrieving that information from their browsing session. This could be used to correlate the ID to the IP address they used to register the ID with the ID and the email. If this concerns you, then sign up for the service via a reliable Onion Router for browsing the Web like Tor.
Denial of Service against a ToxDNS Service: If someone denies users access to the ToxDNS service they wish to use to lookup an ID, then they will not be able to look up ID’s at that service. If this is a concern, you might join multiple ToxDNS services, host your own ToxDNS service, or distribute your whole Tox ID in text form or using a ”tox:” link.It should be noted that none of these area actually problems with ToxDNS itself. The first two are malicious activities that could be undertaken on a server, the third is just somebody taking a site down or blocking access to a site.


Forum Jump:

Users browsing this thread: