Today's Deep-Dive: Tox
Ep. 305

Today's Deep-Dive: Tox

Episode description

This episode explores Tox, a communication platform designed for surveillance resistance through a decentralized, peer-to-peer architecture. It highlights Tox’s philosophy as a rebellion against digital surveillance, offering free and open-source software with a focus on user freedom and transparency. The platform aims to be a comprehensive communication suite, including secure instant messaging, voice and video calls, screen sharing, and file sharing without artificial limits, leveraging its peer-to-peer nature to bypass traditional server-based constraints. Technically, Tox relies on strong end-to-end encryption using libraries like libsodium and a distributed network architecture that eliminates central servers, making it resilient to shutdowns and data seizure. However, a critical caveat is that Tox is currently an experimental cryptographic network library. Its overall security model has not yet undergone formal independent audits, meaning users are warned to use it at their own risk. Despite this, Tox employs automated security testing tools and has an active open-source development process. The core tension presented is the trade-off between the promise of radical digital freedom and privacy offered by decentralization, and the inherent risks associated with using experimental software that is still evolving and awaiting full external security validation. This raises a fundamental question for users about how much individual risk they are willing to accept in exchange for ultimate privacy and control.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

Okay, let's unpack this. We are diving into a topic that, well, it really hits

0:04

close to home

0:04

for anyone concerned about digital privacy. Secure communication is fundamental.

0:09

Exactly. And we've got sources talking about talks. It claims to be a truly

0:15

surveillance

0:17

resistant way to message people. So if you've ever worried about those big apps

0:21

maybe listening in

0:22

or logging your chats, this deep dive is definitely for you. It is a critical

0:27

subject, yeah.

0:28

And our mission today really is to give you a clear way into understanding this

0:33

technology.

0:34

Make it accessible.

0:34

Right. We want to simplify the core ideas of talks, like its decentralized nature,

0:39

how it's built differently, and its security model.

0:41

So you don't just get what it is.

0:42

But why it matters, why it represents maybe a necessary shift away from platforms

0:47

that track so

0:48

much. Okay, perfect. Now, before we jump into all that cryptographic freedom stuff,

0:53

just a quick

0:53

word about the supporter of this deep dive. Sure. This deep dive is brought to you

0:57

by Safe Server.

0:58

Safe Server is dedicated to hosting software and supporting you through your

1:02

digital transformation

1:04

journey. So they help make sure the infrastructure is there for projects like this.

1:07

Exactly. You can

1:08

find out more over at www.safeserver.de. Good to know. So here's where it gets

1:13

interesting,

1:14

the whole philosophy behind talks. Our sources frame it as a direct response,

1:19

almost a rebellion

1:20

against digital surveillance. That makes sense. People were and are really fed up.

1:26

Fed up with

1:26

existing options that, well, the sources put it bluntly, they spy on us, track us,

1:33

and censor us.

1:34

And that underlying frustration, that's really the engine driving talks'

1:37

development. Right. Whether

1:39

it's corporations wanting your data for ads or governments collecting logs. The

1:43

problem is

1:43

widespread, yeah. And talks promises to be this immediate kind of easy to use

1:48

countermeasure.

1:49

And the core pitch is powerful, isn't it? Software that connects you with friends

1:53

and

1:53

family without anyone else listening in. That's the dream for many.

1:57

Now, what makes their approach, their philosophy, different from maybe other apps

2:01

that claim to be

2:02

secure? It seems like it's rooted in this idea of freedom, not just about cost.

2:07

Exactly. And we really need to clarify what free means in the context of talks. It's

2:11

free software. Meaning?

2:13

Meaning free, as in freedom. You know, the freedom to use the software, look at the

2:18

source code,

2:19

modify it, share it.

2:20

Okay, so transparency.

2:22

Total transparency. And yes, it's also free in price, no charge.

2:26

Which reinforces that idea you mentioned. It's made by the users for the users.

2:30

That's the claim. The sources are quite clear. No corporate interests and no hidden

2:34

agendas.

2:35

It's built to be simple and secure messaging.

2:38

And that open source aspect, that transparency, that's pretty key in the security

2:42

world, isn't it?

2:42

Oh, absolutely. It means anyone, any expert, any curious user can examine the code.

2:48

Making it theoretically harder to hide back doors or sneaky tracking stuff.

2:52

Precisely. The community, in theory, acts as a kind of constant auditor.

2:56

If the code's visible, flaws are hopefully found faster.

2:59

Okay, now let's talk practicality. A privacy app is great in theory,

3:03

but it's only useful if people actually, well, use it.

3:06

Right, it needs to compete.

3:08

And that means it has to offer features people expect from their regular chat

3:12

platforms.

3:12

It's not just about secure texts, is it?

3:15

No, not at all. The sources show it's aiming to be a full communication suite.

3:20

Trying to be a viable replacement for the big names.

3:22

That seems to be the goal. You get your instant messaging,

3:24

obviously secure and encrypted.

3:26

And it's stuff?

3:27

But also completely free and encrypted voice calls.

3:30

Okay.

3:30

And importantly, secure video calls, you know, for actually seeing people face to

3:35

face, but privately.

3:37

Right. I noticed the features list in the sources goes a bit beyond just chat

3:40

though.

3:41

Screen sharing.

3:42

Yeah, screen sharing is in there.

3:43

Securely share your desktop, maybe for a collaboration or helping someone out.

3:48

And this next one caught my eye.

3:49

File sharing. The sources say no artificial limits or caps.

3:54

Now, wait a minute. That sounds huge.

3:58

How can they promise no limits if there are no central servers managing things?

4:02

Don't regular services cap file sizes because of server costs?

4:06

They absolutely do. Server storage and bandwidth cost money, so caps are normal.

4:10

So how does Tox bypass that?

4:12

Well, this is where that peer-to-peer, that distributed architecture,

4:16

really starts to show its strength.

4:17

Oh, okay.

4:18

When you share a file using Tox, you're not uploading it to a central server first.

4:22

You're sending it directly to your friend's device.

4:24

Peer-to-peer, peer-to-peer.

4:26

Exactly. The transfer relies only on the internet connection between the two of you.

4:31

So the only real limit becomes your own upload or download speed,

4:35

not some arbitrary corporate limit designed to save them money.

4:39

Wow. So the lack of a central server actually becomes a feature for big file

4:43

transfers.

4:44

In this case, yes. It also enables secure group chats, naturally.

4:48

Right. For sharing messages, calls, video, even those potentially large files with

4:53

a whole group.

4:54

Correct. It's ambitious, like you said.

4:56

It definitely establishes that the goal isn't just some niche, super secure tool

5:00

for experts.

5:01

No, it's aiming for a comprehensive, viable, surveillance-free replacement for

5:06

everyday communication.

5:08

All right. Let's get into the real deep dive part now.

5:11

The technical magic, as the outline called it. How does it actually stop people

5:15

from listening in?

5:16

Okay. So it really boils down to two main pillars, technically speaking.

5:20

Which are?

5:21

Encryption and distribution.

5:23

Okay. Let's take encryption first. How does that work? What makes it secure?

5:26

So the foundational security, the scrambling of the messages, it's built using well-known,

5:32

trusted, open-source libraries.

5:34

Libraries. Like collections of code.

5:36

Exactly. Code that handles the complex math of encryption.

5:40

Specifically, the core uses something called libsodium.

5:44

Libsodium. Why should, say, a beginner listening care about that specific name?

5:49

Think of libsodium-like. A really high-quality, tested engine in a secure car. It's

5:55

based on

5:55

another respected system called NECL, and it's known for being modern, fast, and

6:01

very hard to break.

6:02

So it's not some homemade encryption they cooked up themselves.

6:04

No, no. It uses industry-standard, vetted cryptography.

6:08

This is critical because it underpins that central promise we talked about.

6:11

The only people who can see your conversations are the people you're talking with.

6:14

Precisely. That's what strong end-to-end encryption powered by something like libsodium

6:19

provides.

6:20

Okay, so encryption protects the message. But what about the system itself?

6:25

Protecting the network from being shut down or monitored.

6:28

This feels like the big aha moment.

6:31

Right. And that comes down to the second pillar, distribution.

6:34

Meaning no central point.

6:38

Exactly. Tox has no central servers. Think about the difference.

6:42

Imagine trying to take down an old-style ham radio network where everyone connects

6:47

directly

6:48

versus trying to shut down a modern cell phone tower.

6:50

The tower is one big target. Easy to find, easy to control.

6:54

Right. But a distributed peer-to-peer network.

6:57

The network is just the users connected to each other. There's no single hub.

7:01

So that eliminates that single point of failure.

7:03

Servers can be raided by authorities, right? They can be shut down legally or

7:07

technically.

7:07

Or a company or government can force them to hand over user data, logs.

7:12

All of that becomes much, much harder if there's no central server to target.

7:16

Where do you send the subpoena? Who do you raid?

7:17

The whole system becomes way more resilient to that kind of pressure.

7:20

It does. And there's that bonus practical benefit to remember the server outages on

7:25

big platforms.

7:25

Oh, yeah.

7:26

Well, if the network is simply made up of its users,

7:29

it's much less likely to have a single massive outage. It's inherently more robust.

7:35

OK, but hang on. If there are no central servers, how do I even find my friends

7:39

online?

7:40

Don't you need some kind of central directory like a phone book to connect?

7:44

Oh, that is the classic challenge for any peer-to-peer network.

7:48

It's a real technical hurdle.

7:50

So how does Tox solve it?

7:52

It uses a few techniques. The main one involves your unique Tox ID.

7:56

It's a long string of characters, like a public key.

7:59

OK, so I share my ID with my friend. They share theirs with me.

8:02

Right. And then your Tox client uses the network itself,

8:05

specifically something called a distributed hash table or DHT.

8:09

DHT sounds complicated.

8:11

Think of it like a decentralized address book spread across many users on the

8:15

network.

8:16

Your client uses the DHT, plus maybe a little help from some initial bootstrap

8:20

nodes,

8:20

publicly known starting points to find out your friend's current IP address.

8:24

So those bootstrap nodes give it a starting nudge, help find the path.

8:27

Exactly. They help initiate the connection.

8:30

But once that connection is made, the actual communication,

8:33

your messages, calls, files, flows directly peer to peer between you and your

8:38

friend.

8:38

It doesn't route through some central hub.

8:40

Correct. Only the initial finding each other part gets a little help from those

8:44

public nodes.

8:45

The ongoing conversation is direct.

8:47

And that radical distribution is really what sets it apart,

8:50

even from other apps that might use encryption but still rely on central servers.

8:54

That's the core difference, yes.

8:55

Okay. So the goals are ambitious, true freedom, security through decentralization.

9:01

The architecture sounds impressive, but we have to shift gears a bit.

9:06

Time for the critical context.

9:08

Yeah. Our sources include some really important caveats,

9:11

some warnings about its current status that anyone thinking of using it needs to

9:14

know.

9:15

This is absolutely crucial. It cannot be stressed enough.

9:18

The sources literally use bold text to emphasize this point.

9:21

Tox is currently an experimental cryptographic network library.

9:26

Experimental. What does that mean in practical terms for a user?

9:29

If the underlying crypto math, like libsodium, is solid, where's the risk?

9:35

The risk lies in the implementation,

9:37

how all those secure pieces are put together into a working system.

9:41

Experimental means the overall security model, the whole design,

9:45

has not yet been formally audited by an independent third-party security firm.

9:50

You know, specialists in cryptography or finding flaws in complex systems.

9:54

So no official stamp of approval from outside experts yet?

9:58

Not yet. They're very open about this, which is good,

10:00

but it means users are explicitly warned. Use this library at your own risk.

10:06

So even with a strong engine, blue sodium, the blueprint for the rest of the car,

10:11

how the doors lock, how the steering works, that hasn't been fully crash tested by

10:15

outsiders.

10:16

That's a decent analogy, yeah. The overall architecture, how connections are

10:19

handled,

10:20

precisely what threats it protects against that's still being refined and debated

10:24

within the

10:24

community. The sources even reference specific ongoing discussions about defining

10:28

the formal

10:29

threat model. Trying to figure out exactly what kinds of attacks it should be able

10:32

to resist.

10:33

Correct. And they're also open about known weaknesses, which is important. They

10:38

point

10:38

to discussions about things like, what happens if someone steals your secret key?

10:42

Which is vital for users to understand, especially if they're considering it for

10:46

highly sensitive stuff. Absolutely. That level of transparency about ongoing work

10:51

and potential issues,

10:52

while maybe a bit scary, is actually essential for trustworthy security projects.

10:57

Right. Now, despite that experimental label, the development process itself sounds

11:01

pretty

11:02

active and professional, doesn't it? It's all open source on GitHub. Very much so.

11:06

They use multiple SaaS tool tools. Static application security testing.

11:15

Yes. Tools like Coverity, CPP Check, PVS Studio.

11:20

Okay. What are those? Why should a non-developer care?

11:23

Think of SaaS tools as automated code checkers, like Spell Check and Grammar Check,

11:28

but for potential security bugs and common programming mistakes.

11:31

So they scan the code automatically.

11:33

Constantly. They scan the millions of lines of C code, looking for patterns that

11:37

often

11:37

lead to vulnerabilities. It's like having robot auditors doing a first pass.

11:42

Finding potential problems before a human even needs to look.

11:45

Exactly. Using these tools shows a serious commitment to code quality and finding

11:50

bugs

11:50

early, even before they get to that big formal third-party audit stage.

11:54

That's definitely reassuring. Okay. So this brings us to maybe the most important

11:58

question

11:59

for you, the listener. We've got talks offering this potentially radical digital

12:04

freedom, right?

12:04

Decentralized, aiming to resist surveillance. But that freedom comes wrapped in the

12:10

known risks of

12:11

using cutting-edge experimental software that hasn't finished its external security

12:15

validation.

12:16

That's the core tension. So if the overall security

12:19

model hasn't been fully audited, what are the stakes? Is it just, oh, my message

12:23

might not

12:24

send reliably, or could someone's privacy genuinely be compromised in ways we don't

12:28

know yet?

12:29

The stakes are potentially high. Because that full independent verification isn't

12:34

complete,

12:35

there is a possibility that an unknown flaw in how the pieces are put together

12:39

could exist.

12:40

A flaw that could allow eavesdropping. Or maybe finding out who is talking to whom.

12:45

It's possible. An undiscovered bug in the protocol implementation could potentially

12:50

leak information. It's a trade-off you have to consciously make. So you gain that

12:54

strong

12:55

resistance to corporate or government seizure because there's no central point to

12:59

attack.

12:59

Right. But you personally take on the risk associated with the software's current,

13:04

let's say, maturity level. It's experimental status.

13:07

Okay. That leads us nicely to our summary takeaway then.

13:10

We've seen TOCS offers this pretty comprehensive vision for surveillance-resistant

13:16

communication.

13:17

Built on that peer-to-peer architecture.

13:19

Aiming for genuine freedom and security by cutting out the middleman, the central

13:24

server.

13:24

But.

13:25

But, and it's a big but, we have to weigh that significant promise against the

13:30

critical

13:30

fact that it is still an experimental library. It hasn't completed those formal

13:34

independent

13:35

security audits yet.

13:36

Yeah. And connecting that to the bigger picture,

13:38

it raises a fundamental question for all of us seeking more digital freedom.

13:42

When you want that kind of true freedom, the kind that removes central points of

13:48

control,

13:48

whether corporate or governmental, how much individual risk are you willing to

13:52

accept?

13:53

Risk in the form of using software that's still evolving, still being tested.

13:57

Exactly. How much risk is acceptable to you in exchange for that ultimate privacy

14:02

and control?

14:03

It's a core tension we'll likely see more of.

14:06

Definitely something for you to mull over as you make your own choices about

14:09

digital tools.

14:10

An excellent thought to end on.

14:11

And remember, this deep dive was supported by Safe Server.

14:14

They help with hosting needs and digital transformation.

14:17

You can find out more about them at www.safeserver.de.

14:21

That's right, www.safeserver.de.

14:24

Thank you for joining us for this deep dive into talks.

14:27

to think critically about your communication choices.

14:27

to think critically about your communication choices.