15 KiB
meta_title, title, icon, description, cover
meta_title | title | icon | description | cover |
---|---|---|---|---|
Die besten privaten Instant Messengers - Privacy Guides | Echtzeitkommunikation | material/chat-processing | Verschlüsselte Messenger wie Signal und SimpleX schützen deine sensible Kommunikation vor neugierigen Blicken. | real-time-communication.webp |
Schützt vor der/den folgenden Bedrohung(en):
- :material-bug-outline: Passive Angriffe{.pg-orange}
- :material-server-network: Diensteanbieter{.pg-teal}
- :material-eye-outline: Massenüberwachung{.pg-blue}
- :material-account-cash: Überwachungskapitalismus{.pg-brown}
These recommendations for encrypted real-time communication are great for securing your sensitive communications. These instant messengers come in the form of many types of communication networks.
:material-movie-open-play-outline: Video: It's time to stop using SMS{.md-button}
Signal
Signal ist eine mobile App, die von Signal Messenger LLC entwickelt wurde. Die App bietet Instant Messaging und Anrufe, die mit dem Signal-Protokoll gesichert sind, einem extrem sicheren Verschlüsselungsprotokoll, dass Forward Secrecy1 und Post-Compromise Security2 unterstützt.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Datenschutzerklärung" } :octicons-info-16:{ .card-link title="Dokumentation" } :octicons-code-16:{ .card-link title="Quellcode" } :octicons-heart-16:{ .card-link title="Spenden" }
Signal requires your phone number for registration, however you should create a username to hide your phone number from your contacts:
- Öffne in Signal die Einstellungen der App und tippe oben auf dein Kontoprofil.
- Tap Username and choose Continue on the "Set up your Signal username" screen.
- Gebe einen Nutzernamen ein. Dein Benutzername wird immer mit einer eindeutigen Ziffernfolge gekoppelt, damit dein Benutzername eindeutig ist und nicht erraten werden kann. Wenn du beispielsweise "John" eingibst, könnte dein Benutzername
@john.35
lauten. Standardmäßig werden deinem Benutzernamen bei der Erstellung nur 2 Ziffern zugeordnet, aber du kannst weitere Ziffern hinzufügen, bis du die maximale Länge des Benutzernamens erreichst (32 Zeichen). - Gehe zurück zur Hauptseite der App-Einstellungen und wähle Datenschutz.
- Wähle Telefonnummer
- Ändere die Einstellung Wer kann meine Telefonnummer sehen zu: Niemand
You can optionally change the Who Can Find Me By Number setting to Nobody as well, if you want to prevent people who already have your phone number from discovering your Signal account/username.
Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports private groups, where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when Sealed Sender is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam.
The protocol was independently audited in 2016. The specification for the Signal protocol can be found in their documentation.
We have some additional tips on configuring and hardening your Signal installation:
Signal Configuration and Hardening :material-arrow-right-drop-circle:
Molly (Android)
If you use Android and your threat model requires protecting against :material-target-account: Targeted Attacks{.pg-red} you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.
Molly ist ein alternativer Signal-Client für Android, der es dir ermöglicht, die lokale Datenbank im Ruhezustand mit einer Passphrase zu verschlüsseln, ungenutzte RAM-Daten sicher zu schreddern, deine Verbindung über Tor zu leiten und mehr. Es gibt auch Verbesserungen bei der Benutzerfreundlichkeit, darunter geplante Backups, automatisches Sperren, Unterstützung für UnifiedPush und die Möglichkeit, dein Android-Telefon als verknüpftes Gerät anstelle des Hauptgeräts für ein Signal-Konto zu verwenden.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Datenschutzerklärung" } :octicons-info-16:{ .card-link title="Dokumentation" } :octicons-code-16:{ .card-link title="Quellcode" } :octicons-heart-16:{ .card-link title="Spenden" }
Molly is updated every two weeks to include the latest features and bug fixes from Signal. The exception is security issues, which are patched as soon as possible. That said, you should be aware that there might be a slight delay compared to upstream, which may affect actions such as migrating from Signal to Molly.
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team and the Molly team to deliver safe and timely updates.
There is a version of Molly called Molly-FOSS which removes proprietary code like the Google services used by both Signal and Molly, at the expense of some features like battery-saving push notifications via Google Play Services. You can regain push notifications without Google Play Services in either version of Molly with UnifiedPush, but it requires running a separate program called Mollysocket on another device to function. Mollysocket can either be self-hosted on a separate computer or server (VPS), or alternatively a public Mollysocket instance can be used (step-by-step tutorial, in German).
All versions of Molly provide the same security improvements.
Molly and Molly-FOSS support reproducible builds, meaning it's possible to confirm that the compiled APKs match the source code.
SimpleX Chat
SimpleX Chat ist ein Instant Messenger, der ohne eindeutigen Identifikatoren wie Telefonnummern oder Benutzernamen auskommt. Sein dezentrales Netzwerk macht SimpleX Chat zu einem effektiven Werkzeug gegen :material-close-outline: Zensur{ .pg-blue-gray }.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Datenschutzerklärung" } :octicons-info-16:{ .card-link title="Dokumentation" } :octicons-code-16:{ .card-link title="Quellcode" }
SimpleX provides direct messaging, group chats, and E2EE calls secured with the SimpleX Messaging Protocol, which uses double ratchet encryption with quantum resistance. Additionally, SimpleX Chat provides metadata protection by using unidirectional "simplex queues" to deliver messages.
To participate in conversations on SimpleX Chat, you must scan a QR code or click an invite link. This allows you to verify a contact out-of-band, which protects against man-in-the-middle attacks by network providers. Your data can be exported and imported onto another device, as there are no central servers where this is backed up.
You can find a full list of the privacy and security features implemented in SimpleX Chat on the app's repository.
SimpleX Chat was independently audited in July 2024 and in October 2022.
Briar
Briar ist ein verschlüsselter Instant-Messenger, der sich mit anderen Geräten über das Tor-Netzwerk verbindet. Das macht es zu einem effektiven Werkzeug zur Umgehung von :material-close-outline: Zensur{ .pg-blue-gray }. Briar kann sich auch über Wi-Fi oder Bluetooth verbinden, wenn sich die Geräte in der Nähe befinden. Dieser lokale Mesh-Modus von Briar kann nützlich sein, wenn die Internetverfügbarkeit ein Problem darstellt.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Datenschutzerklärung" } :octicons-info-16:{ .card-link title="Dokumentation" } :octicons-code-16:{ .card-link title="Quellcode" } :octicons-heart-16:{ .card-link title="Spendenoptionen sind unten auf der Homepage aufgeführt" }
To add a contact on Briar, you must both add each other first. You can either exchange briar://
links or scan a contact’s QR code if they are nearby.
The client software was independently audited, and the anonymous routing protocol uses the Tor network which has also been audited.
Briar has a fully published specification.
Briar supports forward secrecy1 by using the Bramble Handshake and Transport protocol.
Criteria
Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
Mindestanforderungen
- Must have open-source clients.
- Must not require sharing personal identifiers (particuarly phone numbers or emails) with contacts.
- Must use E2EE for private messages by default.
- Must support E2EE for all messages.
- Must support forward secrecy1
- Es muss ein veröffentlichtes Audit von einem angesehenen, unabhängigen Dritten vorliegen.
Im besten Fall
Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt in dieser Kategorie wünschen würden. Unsere Empfehlungen enthalten möglicherweise keine oder nicht alle dieser Merkmale, aber diejenigen, die sie enthalten, werden möglicherweise höher eingestuft als andere auf dieser Seite.
- Should support future secrecy (post-compromise security)2
- Should have open-source servers.
- Should use a decentralized network, i.e. federated or P2P.
- Should use E2EE for all messages by default.
- Should support Linux, macOS, Windows, Android, and iOS.
-
Forward secrecy is where keys are rotated very frequently, so that if the current encryption key is compromised, it does not expose past messages as well. ↩︎
-
Future secrecy (or post-compromise security) is a feature where an attacker is prevented from decrypting future messages after compromising a private key, unless they compromise more session keys in the future as well. This effectively forces the attacker to intercept all communication between parties since they lose access as soon as a key exchange occurs that is not intercepted. ↩︎