1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-09-01 02:49:14 +00:00
Files
i18n/i18n/ko/real-time-communication.md
2024-08-25 05:33:39 +00:00

20 KiB
Raw Blame History

meta_title, title, icon, description, cover
meta_title title icon description cover
The Best Private Instant Messengers - Privacy Guides 실시간 커뮤니케이션 material/chat-processing Other instant messengers make all of your private conversations available to the company that runs them. real-time-communication.webp

Protects against the following threat(s):

These are our recommendations for encrypted real-time communication.

통신 네트워크 유형 :material-arrow-right-drop-circle:

암호화 메신저

암호화 메신저는 민감한 대화를 보호하는 용도로 유용합니다.

Signal

Signal 로고{ align=right }

Signal은 Signal Messenger LLC에서 개발한 모바일 앱입니다. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy1 and post-compromise security.2

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }

Downloads

Signal requires your phone number for registration, however you should create a username to hide your phone number from your contacts:

  1. In Signal, open the app's settings and tap your account profile at the top.
  2. Tap Username and choose Continue on the "Set up your Signal username" screen.
  3. Enter a username. Your username will always be paired with a unique set of digits to keep your username unique and prevent people from guessing it, for example if you enter "John" your username might end up being @john.35. By default, only 2 digits are paired with your username when you create it, but you can add more digits until you reach the username length limit (32 characters).
  4. Go back to the main app settings page and select Privacy.
  5. Select Phone Number
  6. Change the Who Can See My Number setting to: Nobody

You can optionally change the Who Can Find Me By Number setting to Nobody as well, if you want to prevent people who already have your phone number from discovering your Signal account/username.

Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. 개인 프로필 또한 암호화되어 여러분이 대화하는 상대에게만 공유됩니다. Signal supports private groups, where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when Sealed Sender is enabled. 해당 기능을 사용할 경우, 발신자 주소는 메시지 본문과 함께 암호화되어 서버에서는 수신자 주소만 볼 수 있습니다. Sealed Sender는 연락처 목록에 있는 사람들에게만 활성화되지만, 스팸 수신 위험성이 높아짐에 따라 모든 수신자에게 활성화하는 것도 가능합니다.

Signal 프로토콜은 2016년에 독립적으로 감사를 받았습니다. The specification for the Signal protocol can be found in their documentation.

Signal 설치 구성 및 보안 강화 관련 도움말이 필요하신 분은 다음 내용을 참고하세요.

Signal 설정 및 보안 강화 :material-arrow-right-drop-circle:

Molly (Android)

If you use Android and your threat model requires protecting against :material-target-account: Targeted Attacks{.pg-red} you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.

Molly logo{ align=right }

Molly is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and more. It also has usability improvements including scheduled backups, automatic locking, and the ability to use your Android phone as a linked device instead of the primary device for a Signal account.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title="Documentation"} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title="Contribute" }

Downloads

Molly is updated every two weeks to include the latest features and bug fixes from Signal. The exception is security issues, which are patched as soon as possible. That said, you should be aware that there might be a slight delay compared to upstream, which may affect actions such as migrating from Signal to Molly.

Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team and the Molly team to deliver safe and timely updates.

There is a version of Molly called Molly-FOSS which removes proprietary code like the Google services used by both Signal and Molly, at the expense of some features like push notifications. There is also a version called Molly-UP which is based on Molly-FOSS and adds back support for push notifications with UnifiedPush, but it requires self-hosting a program on a separate computer to function. All three versions of Molly provide the same security improvements.

Molly and Molly-FOSS support reproducible builds, meaning it's possible to confirm that the compiled APKs match the source code.

SimpleX Chat

Simplex logo{ align=right }

SimpleX Chat is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against :material-close-outline: Censorship{ .pg-blue-gray }. SimpleX Chat에서는 QR 코드를 스캔하거나 초대 링크를 클릭하여 그룹 대화에 참여합니다.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

SimpleX Chat 보안 감사는 Trail of Bits이 2022년 10월에 진행하였습니다.

SimpleX Chat supports basic group chatting functionality, direct messaging, and editing of messages and markdown. E2EE 음성 및 영상 통화 또한 지원됩니다. Your data can be exported and imported onto another device, as there are no central servers where this is backed up.

Briar

Briar logo{ align=right }

Briar is an encrypted instant messenger that connects to other clients using the Tor Network, making it an effective tool at circumventing :material-close-outline: Censorship{ .pg-blue-gray }. 근거리에 있는 경우 Wi-Fi 혹은 Bluetooth를 통해 연결하는 것도 가능합니다. Briar 로컬 메시 모드는 인터넷을 제대로 사용할 수 없는 상황에도 유용합니다.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title="Donation options are listed on the bottom of the homepage" }

Downloads

Briar 연락처에 누군가를 등록하려면 서로가 모두 서로를 연락처에 추가해야 합니다. briar:// 링크를 서로 교환하거나, (가까운 거리에 있는 경우) 연락처에서 QR 코드를 스캔하여 추가할 수 있습니다.

The client software was independently audited, and the anonymous routing protocol uses the Tor network which has also been audited.

Briar 사양 문서는 전체 공개되어 있습니다.

Briar supports forward secrecy1 by using the Bramble Handshake and Transport protocol.

추가 선택지

Warning

These messengers do not have forward secrecy1 , and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. 대화 참여자 중 한 명만 키가 유출되더라도 이전에 주고받은 모든 메시지의 기밀성이 손상됩니다.

Element

Element logo{ align=right }

Element is the flagship client for the Matrix protocol, an open standard for secure decentralized real-time communication.

Messages and files shared in private rooms (those which require an invite) are by default E2EE, as are one-to-one voice and video calls.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

프로필 사진, 메시지 반응, 닉네임은 암호화가 적용되지 않습니다.

Group voice and video calls are not E2EE and use Jitsi, but this is expected to change with Native Group VoIP Signalling. 현재 그룹 통화는 인증 과정을 거치지 않습니다. 즉, 룸 참가자가 아닌 사람도 통화에 난입하는 것이 가능합니다. 사적인 모임에서는 해당 기능을 사용하지 않는 것이 좋습니다.

The Matrix protocol itself theoretically supports forward secrecy1 , however this is not currently supported in Element due to it breaking some aspects of the user experience such as key backups and shared message history.

Matrix 프로토콜은 2016년에 독립적으로 감사를 받았습니다. The specification for the Matrix protocol can be found in their documentation. The Olm cryptographic ratchet used by Matrix is an implementation of Signals Double Ratchet algorithm.

Session

Session 로고{ align=right }

Session는 비공개, 보안, 익명 대화에 중점을 둔 탈중앙화 메신저입니다. Session은 개인 메시지, 그룹 채팅, 음성 통화를 지원합니다.

Session uses the decentralized Oxen Service Node Network to store and route messages. 모든 암호화 메시지는 Oxen 서비스 노드 네트워크의 노드 3개를 이용해 라우팅되므로, 특정 노드가 사용자에 대한 의미 있는 정보를 수집하는 것은 불가능에 가깝습니다.

:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }

Downloads

Session은 일대일 채팅 및 최대 100명까지 참여 가능한 비공개 그룹에서 E2EE를 지원합니다. 공개 그룹은 구성원 수에 제한이 없지만, 설계상 개방되어 있습니다.

Session was previously based on Signal Protocol before replacing it with their own in December 2020. Session Protocol does not support forward secrecy.1

Oxen requested an independent audit for Session in March 2020. The audit concluded in April 2021:

The overall security level of this application is good and makes it usable for privacy-concerned people.

Session has a whitepaper describing the technical details of the app and protocol.

평가 기준

Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다. 객관적인 권장 목록을 제공하기 위해, 일반적인 평가 기준에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다.

최소 요구 사항

  • Has open-source clients.
  • Does not require sharing personal identifiers (phone numbers or emails in particular) with contacts.
  • Uses E2EE for private messages by default.
  • Supports E2EE for all messages.
  • Has been independently audited.

우대 사항

평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다.

  • Supports forward secrecy1
  • Supports Future Secrecy (Post-Compromise Security)2
  • Has open-source servers.
  • Decentralized, i.e. federated or P2P.
  • Uses E2EE for all messages by default.
  • Supports Linux, macOS, Windows, Android, and iOS.

  1. Forward secrecy is where keys are rotated very frequently, so that if the current encryption key is compromised, it does not expose past messages as well. ↩︎

  2. Future Secrecy (or Post-Compromise Security) is a feature where an attacker is prevented from decrypting future messages after compromising a private key, unless they compromise more session keys in the future as well. This effectively forces the attacker to intercept all communication between parties, since they lose access as soon as a key exchange occurs that is not intercepted. ↩︎