Feeds

'Spy-proof' IM launched: Aims to offer anonymity to whistleblowers

*reaction gif* I'm just getting all the secret files. BRB...

Remote control for virtualized desktops

Security experts have teamed up to created a stealthy internet messenger client designed especially for whistleblowers.

The ‪invisible.im project promises an instant messenger that leaves no trace‬. The team behind the project include Metasploit Founder HD Moore and noted infosec and opsec experts The Grugq.

That's the infosec equivalent of putting together Worf and Spock to fend off starfleet enemies, so the results are sure to be worth watching.

‪invisible.im ‬is primarily geared towards serving the stringent anonymity needs of whistleblowers, as the project website explains.

invisible.im was established to develop an instant messenger and file transfer tool that leaves virtually no evidence of conversations or transfers having occurred. The primary use case for this technology is for whistleblowers and media sources who wish to remain anonymous when communicating with the press or other organisations.

The project, which is still in its early stages, is looking for developers to port its concept to various platforms (Windows, OS X and Linux). It also wants software and security experts capable of hooking the software into the darknet, specifically the i2p anonymisation network. It is also very keen to work with developers who are knowledgable about Tor.

SecureDrop and StrongBox are a good approach for large media organisation such as the New York Times but "are complex and require secure supporting infrastructure". ‪invisible.im‬ aims to plug this gap with technology an "instant message and file transfer client that leaves as small a metadata trail as possible". TorChat offers anonymity but still requires a registered IM account with an IM provider like AOL, Yahoo or MS that inevitably leaks metadata.

‪invisible.im ‬openly acknowledges that any system it develops is never going to offer absolute anonymity under all circumstances.

"If a source is already the subject of targeted surveillance, Invisible.im cannot facilitate secure, anonymous chats," it concedes.

More details on the scope of the project and its general design principles can be found in the FAQ section on the ‪invisible.im ‬website here. ®

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?