Skip to content
Markus Ottela edited this page Sep 21, 2022 · 24 revisions

Welcome to the TFC wiki.

TFC is not a standard encrypted messaging app that is run on one's everyday computer. For such environments, there already exists more convenient tools, e.g. Cwtch.im, Briar Desktop client and Signal desktop client. TFC can be tested on a single computer, but without the security features that set it apart from all the other tools.

TFC is the first messaging tool designed to be run in hardware configuration that provides strong endpoint security. This security cannot be obtained without the inconvenience of investing in hardware and learning how to operate the system securely. As Bruce Schneier puts it, security is a process, not a product. To understand the caveats and how the security process around TFC works, make sure to read the wiki thoroughly before serious use.

Table of Contents

Threat model
FAQ

Security design
    The issue of endpoint security
    Security overview and roles of TFC computers
    Cryptographic design
    Master key derivation and protection of data at rest
    Secure communication between Source and Destination Computer
    Adding contact
    X448 key exchange protocol
    PSK key exchange protocol
    End-to-end encrypted group conversations
    Traffic masking and metadata protection
    File transmission protocols
    Attacks against TFC
    Error tolerance
    Code quality and secure programming practices

Hardware Data Diode
    Breadboard version (Easy)
    Perfboard version (Intermediate)
    PCB version (Advanced)

How to use
    Installation
    Master password setup
    Local key setup
    Onion Service setup
    X448 key exchange
    Pre-shared keys
    Commands

Update Log