1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-28 13:22:36 +00:00
Files
i18n/i18n/ja/real-time-communication.md
2024-03-13 04:31:23 +00:00

16 KiB
Raw Blame History

meta_title, title, icon, description, cover
meta_title title icon description cover
The Best Private Instant Messengers - Privacy Guides リアルタイムコミュニケーション material/chat-processing Other instant messengers make all of your private conversations available to the company that runs them. real-time-communication.webp

以下は、暗号化されたリアルタイム通信に関する推奨事項です。

Types of Communication Networks :material-arrow-right-drop-circle:

暗号化されたメッセンジャー

以下のメッセンジャーは、機密性の高い通信を保護するのに適しています。

Signal

Signal logo{ align=right }

Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy1 and post-compromise security.2

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }

Downloads

Signal requires your phone number for registration, however you should create a username to hide your phone number from your contacts:

  1. In Signal, open the app's settings and tap your account profile at the top.
  2. Tap Username and choose Continue on the "Set up your Signal username" screen.
  3. Enter a username. Your username will always be paired with a unique set of digits to keep your username unique and prevent people from guessing it, for example if you enter "John" your username might end up being @john.35.
  4. Go back to the main app settings page and select Privacy.
  5. Select Phone Number
  6. Change the Who Can See My Number setting to: Nobody

You can optionally change the Who Can Find Me By Number setting to Nobody as well, if you want to prevent people who already have your phone number from discovering your Signal account/username.

Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports private groups, where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when Sealed Sender is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam.

The protocol was independently audited in 2016. The specification for the Signal protocol can be found in their documentation.

We have some additional tips on configuring and hardening your Signal installation:

Signal Configuration and Hardening :material-arrow-right-drop-circle:

SimpleX Chat

Simplex logo{ align=right }

SimpleX Chat is an instant messenger that is decentralized and doesn't depend on any unique identifiers such as phone numbers or usernames. Users of SimpleX Chat can scan a QR code or click an invite link to participate in group conversations.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

SimpleX Chat was audited by Trail of Bits in October 2022.

SimpleX Chat supports basic group chatting functionality, direct messaging, and editing of messages and markdown. E2EEのオーディオおよびビデオ通話もサポートしています。 Your data can be exported, and imported onto another device, as there are no central servers where this is backed up.

Briar

Briar logo{ align=right }

Briar is an encrypted instant messenger that connects to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briars local mesh mode can be useful when internet availability is a problem.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title="Donation options are listed on the bottom of the homepage" }

Downloads

To add a contact on Briar, you must both add each other first. You can either exchange briar:// links or scan a contacts QR code if they are nearby.

The client software was independently audited, and the anonymous routing protocol uses the Tor network which has also been audited.

Briar has a fully published specification.

Briar supports forward secrecy1 by using the Bramble Handshake and Transport protocol.

追加のオプション

Warning

These messengers do not have forward secrecy1 , and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of all past communications.

Element

Element logo{ align=right }

Element is the reference client for the Matrix protocol, an open standard for secure decentralized real-time communication.

Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

Profile pictures, reactions, and nicknames are not encrypted.

Group voice and video calls are not E2EE, and use Jitsi, but this is expected to change with Native Group VoIP Signalling. Group calls have no authentication currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings.

The Matrix protocol itself theoretically supports forward secrecy1 , however this is not currently supported in Element due to it breaking some aspects of the user experience such as key backups and shared message history.

The protocol was independently audited in 2016. The specification for the Matrix protocol can be found in their documentation. The Olm cryptographic ratchet used by Matrix is an implementation of Signals Double Ratchet algorithm.

Session

Session logo{ align=right }

Session is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls.

Session uses the decentralized Oxen Service Node Network to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

Session allows for E2EE in one-on-one chats or closed groups which allow for up to 100 members. Open groups have no restriction on the number of members, but are open by design.

Session was previously based on Signal Protocol before replacing it with their own in December 2020. Session Protocol does not support forward secrecy.1

Oxen requested an independent audit for Session in March 2020. The audit concluded in April 2021, “The overall security level of this application is good and makes it usable for privacy-concerned people.”

Session has a whitepaper describing the technical details of the app and protocol.

規準

**私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、標準となる規準に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。

This section is new

私たちは、サイトの各項目に関して、定義された規準の確立に取り組んでいます。この規準は変更される可能性があります。 規準について疑問がある場合は、フォーラムで質問してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。

  • Has open-source clients.
  • Does not require sharing personal identifiers (phone numbers or emails in particular) with contacts.
  • Uses E2EE for private messages by default.
  • Supports E2EE for all messages.
  • Has been independently audited.

満たされることが望ましい基準

満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。

  • Supports Forward Secrecy1
  • Supports Future Secrecy (Post-Compromise Security)2
  • Has open-source servers.
  • Decentralized, i.e. federated or P2P.
  • Uses E2EE for all messages by default.
  • Supports Linux, macOS, Windows, Android, and iOS.

  1. Forward Secrecy is where keys are rotated very frequently, so that if the current encryption key is compromised, it does not expose past messages as well. ↩︎

  2. Future Secrecy (or Post-Compromise Security) is a feature where an attacker is prevented from decrypting future messages after compromising a private key, unless they compromise more session keys in the future as well. This effectively forces the attacker to intercept all communication between parties, since they lose access as soon as a key exchange occurs that is not intercepted. ↩︎