BadB
Professional
- Messages
- 1,709
- Reaction score
- 1,700
- Points
- 113
Downloading software
First, we need to download the client itself. I'll take as an example Pidgin - it's cross-platform and easy to set up.
We also need the OTR (Off-the-Record Messaging) plugin, which provides encryption. An installer for the Windows version of Pidgin or sources for building in Linux can download from the project site.
At the first launch, Pidgin will offer to log in with an account, but we will postpone this for now. The fact is that registration will take place from our real IP-address, and it would be good for us to make sure that the IP is hidden even from the owners of the service (what if they decide to happily provide this information to anyone who asks!). For this, you can use any kind of proxy, but we will choose Tor for greater reliability.
Forwarding traffic through Tor
If you have installed Tor Browser, then you can configure traffic forwarding directly from the registration window in the "Proxy" tab.
After launching Tor Browser and our Jabber client, you need to open the "Tools" tab and select the "Settings" item there, and open the "Proxy" item in the settings. Put a tick in the "Use remote DNS with SOCKS4 proxy" checkbox, and in the "Proxy type" item select "Tor / Privacy (SOCKS5)"
In the Node item, specify 127.0.0.1 and choose port 9150. This is the standard Tor port, although the 9050 variation is sometimes encountered.
As you might have guessed, Tor Browser must be running and listening to its port all the time you are chatting. Turn it on before starting Pidgin - then it will not swear at the lack of connection to the server.
Now the Pidgin traffic is going through Tor, and we can start registering. First, we need to decide on the server on which we want to create an account. Of course, you can deploy your own server, but then it will become even more difficult to maintain anonymity.
Choosing a server
There are a huge number of servers, the owners of many of them claim that they do not keep logs. But this is impossible to verify. You can admire how the leaked log will look in the picture.
When choosing a server, first of all it is worth looking at which country it is located in. The EU, the United States and the country in which you live are a deliberately unsuccessful option. Ideally, if the server is located where it is prohibited by law to collect logs. Here is a small list of servers that are trusted by many hackers, both in the CIS and abroad. But note that some of the servers are located in the US.
Nickname selection
Take the choice of a nickname as an example. It would seem an elementary item, but many people scorch on it. You may not remember that you have already used it somewhere else, but Google remembers everything.
The second subtle point is that it would be good not to use nicknames with symbols that have a Cyrillic counterpart. Not all servers have filters configured that prohibit such tricks, so at some point you may have a twin whose name letters do not look different, but have different codes.
Register on the server
Having decided on the username and password, you can start registering on the server. Open the client and select the "Accounts" tab, and in it the "Account Management" item (or just press Ctrl + A).
In the window that appears, click "Add", the registration and authorization window will open.
Here we need to do the following:
After entering all the data, a separate window for user registration may appear. You will have to enter everything one more time and click OK.
Turn on OTR
Accounting is ready, and you can start setting up encryption. I recommend one of two options: PGP or OTR. Here I will take OTR as an example - it provides a high level of security and is easy to configure. However, when using it, messages in the logs are not encrypted - so for complete reliability it is better to disable them. But on the server, the picture looks like the following.
Since we have already downloaded and installed the plugin, it can be activated from the client. Open Pidgin, click "Tools" and select the "Modules" item.
Next, we need to configure this module. To do this, at the very bottom of the list of modules, click "Configure module".
In the module settings window, we first need to generate a key for our account. Select the account for which you want to create a key, and click "Create". The key generation window will appear.
Keys are generated quickly, but sometimes there is a slight lag at this step. Do not be afraid! Pidgin doesn't hang, it's just a little busy. When the work is over, press Ok and you will see your "fingerprint" of forty characters (five groups of eight characters).
Now check the boxes below:
Well, the last checkbox is Show Otr button in toolbar. It simply adds a chat security and interlocutor authentication button to the interface.
We authenticate the interlocutor and protect the chat
In fact, you already have a secure communication channel. To add an interlocutor, you need to click "Interlocutors" and select "Add interlocutor".
Choosing an interlocutor.
And click "Add".
Now the interlocutor will receive a request, and when he confirms it, you can start a chat. The security status can be viewed directly in the chat window. If encryption is not enabled, then there it will be written: "Not protected". By clicking on it, you will see a menu.
If you start a secure conversation, the caption will change to "Not identified." - this means that the chat is protected, but you need to authenticate the interlocutor to be sure that he is exactly who he claims to be.
There are three ways to authenticate an interlocutor.
Question and answer to it. You ask a question to the interlocutor, and he must give the correct answer.
Shared secret.
Manual verification of the key. This is an option in case the key needs to be transferred not via Jabber, but in some other way.
After the interlocutor is authenticated, the green inscription "Protected" will finally appear on the button.
Setting up a mobile client
Jabber clients with encryption support are also available on mobile devices. For example, ChatSecurefor iOS and for android... Just in case, I warn you that the Android application is not listed on the official website and requires a lot of privileges for the messenger, so use it at your own peril and risk.
Registering in the application is the same as registering on a computer. If you already have an account, then instead of creating a new account, select Existing Account on the main page.
Next, choose XMPP.
And enter your data.
If you want to create a new account, then click "Create a new account" and fill in all the data. A big plus of ChatSecure is that it can send traffic through Tor without additional tweaks.
ChatSecure also has a list of private servers - choose which one you like, or, if you have already chosen before, enter the address in the Custom field at the very bottom.
At the end, you will be prompted to save the certificate. Save and wait for registration to complete.
Now you just need to click on the new message icon and click "Add contact" in the menu that appears.
Enter the address of the contact.
And authenticate it with one of the methods we have already listed.
incashwetrust.biz
First, we need to download the client itself. I'll take as an example Pidgin - it's cross-platform and easy to set up.
We also need the OTR (Off-the-Record Messaging) plugin, which provides encryption. An installer for the Windows version of Pidgin or sources for building in Linux can download from the project site.
At the first launch, Pidgin will offer to log in with an account, but we will postpone this for now. The fact is that registration will take place from our real IP-address, and it would be good for us to make sure that the IP is hidden even from the owners of the service (what if they decide to happily provide this information to anyone who asks!). For this, you can use any kind of proxy, but we will choose Tor for greater reliability.
Forwarding traffic through Tor
If you have installed Tor Browser, then you can configure traffic forwarding directly from the registration window in the "Proxy" tab.
After launching Tor Browser and our Jabber client, you need to open the "Tools" tab and select the "Settings" item there, and open the "Proxy" item in the settings. Put a tick in the "Use remote DNS with SOCKS4 proxy" checkbox, and in the "Proxy type" item select "Tor / Privacy (SOCKS5)"
In the Node item, specify 127.0.0.1 and choose port 9150. This is the standard Tor port, although the 9050 variation is sometimes encountered.

As you might have guessed, Tor Browser must be running and listening to its port all the time you are chatting. Turn it on before starting Pidgin - then it will not swear at the lack of connection to the server.

Now the Pidgin traffic is going through Tor, and we can start registering. First, we need to decide on the server on which we want to create an account. Of course, you can deploy your own server, but then it will become even more difficult to maintain anonymity.
Choosing a server
There are a huge number of servers, the owners of many of them claim that they do not keep logs. But this is impossible to verify. You can admire how the leaked log will look in the picture.

When choosing a server, first of all it is worth looking at which country it is located in. The EU, the United States and the country in which you live are a deliberately unsuccessful option. Ideally, if the server is located where it is prohibited by law to collect logs. Here is a small list of servers that are trusted by many hackers, both in the CIS and abroad. But note that some of the servers are located in the US.
Server | The country | Notes (edit) | Logs | Onion mirror |
---|---|---|---|---|
securejabber.me | Germany | May block an account at the request of the German authorities | No | giyvshdnojeivkom.onion |
jabber.calyxinstitute.org | Netherlands | No | ijeeynrc6x2uy5ob.onion | |
sj.ms | Switzerland | No | No | |
swissjabber.ch | Switzerland | No | No | |
xmpp.jp | Japan | No | No | |
wallstreetjabber.biz | USA | Former securetalks.biz | No | wsjabberhzuots2e.onion |
thesecure.biz | Singapore | No | No | |
exploit.im | France | No | No | |
fuckav.in | France | There is a filter for Cyrillic characters | No | No |
jabber.otr.im | Canada | Server from the creators of OTR | No | 5rgdtlawqkcplz75.onion |
jabber.ccc.de | Austria | No | okj7xc6j2szr2y75.onion | |
xmpp.rows.io | USA | No | yz6yiv2hxyagvwy6.onion | |
jabber.cryptoparty.is | Romania | No | cryjabkbdljzohnp.onion | |
neko.im | Netherlands | Previously based in Norway | No | No |
riseup.net | USA | No | 4cjw6cwpeaeppfqz.onion |
Nickname selection
Take the choice of a nickname as an example. It would seem an elementary item, but many people scorch on it. You may not remember that you have already used it somewhere else, but Google remembers everything.
The second subtle point is that it would be good not to use nicknames with symbols that have a Cyrillic counterpart. Not all servers have filters configured that prohibit such tricks, so at some point you may have a twin whose name letters do not look different, but have different codes.
Register on the server
Having decided on the username and password, you can start registering on the server. Open the client and select the "Accounts" tab, and in it the "Account Management" item (or just press Ctrl + A).

In the window that appears, click "Add", the registration and authorization window will open.

Here we need to do the following:
- Select the XMPP protocol from the drop-down list.
- Enter the desired username.
- Enter the domain of the server on which you are going to create an account.
- The resource can be skipped, since it does not affect registration (in fact, this is just an indication of which device this server entrance is tied to - in the roster of your interlocutors it will be written from which resource you came from).
- Enter the desired password.
- Check (or not check) the checkbox to remember the password (I recommend not to check it and not to store the password anywhere except in your head, because if someone gains access to your computer, the password will already be entered).
- Be sure to tick the "Create a new account on the server" checkbox (unless, of course, you have already registered before).

After entering all the data, a separate window for user registration may appear. You will have to enter everything one more time and click OK.

Turn on OTR
Accounting is ready, and you can start setting up encryption. I recommend one of two options: PGP or OTR. Here I will take OTR as an example - it provides a high level of security and is easy to configure. However, when using it, messages in the logs are not encrypted - so for complete reliability it is better to disable them. But on the server, the picture looks like the following.

Since we have already downloaded and installed the plugin, it can be activated from the client. Open Pidgin, click "Tools" and select the "Modules" item.

Next, we need to configure this module. To do this, at the very bottom of the list of modules, click "Configure module".


In the module settings window, we first need to generate a key for our account. Select the account for which you want to create a key, and click "Create". The key generation window will appear.

Keys are generated quickly, but sometimes there is a slight lag at this step. Do not be afraid! Pidgin doesn't hang, it's just a little busy. When the work is over, press Ok and you will see your "fingerprint" of forty characters (five groups of eight characters).

Now check the boxes below:
- "Use secure conversations";
- "Automatically start a secure conversation";
- "Demand protection of the conversation";
- Do not log OTR conversations.
Well, the last checkbox is Show Otr button in toolbar. It simply adds a chat security and interlocutor authentication button to the interface.

We authenticate the interlocutor and protect the chat
In fact, you already have a secure communication channel. To add an interlocutor, you need to click "Interlocutors" and select "Add interlocutor".

Choosing an interlocutor.

And click "Add".
Now the interlocutor will receive a request, and when he confirms it, you can start a chat. The security status can be viewed directly in the chat window. If encryption is not enabled, then there it will be written: "Not protected". By clicking on it, you will see a menu.

If you start a secure conversation, the caption will change to "Not identified." - this means that the chat is protected, but you need to authenticate the interlocutor to be sure that he is exactly who he claims to be.
There are three ways to authenticate an interlocutor.
Question and answer to it. You ask a question to the interlocutor, and he must give the correct answer.

Shared secret.

Manual verification of the key. This is an option in case the key needs to be transferred not via Jabber, but in some other way.

After the interlocutor is authenticated, the green inscription "Protected" will finally appear on the button.
Setting up a mobile client
Jabber clients with encryption support are also available on mobile devices. For example, ChatSecurefor iOS and for android... Just in case, I warn you that the Android application is not listed on the official website and requires a lot of privileges for the messenger, so use it at your own peril and risk.
Registering in the application is the same as registering on a computer. If you already have an account, then instead of creating a new account, select Existing Account on the main page.

Next, choose XMPP.

And enter your data.

If you want to create a new account, then click "Create a new account" and fill in all the data. A big plus of ChatSecure is that it can send traffic through Tor without additional tweaks.

ChatSecure also has a list of private servers - choose which one you like, or, if you have already chosen before, enter the address in the Custom field at the very bottom.

At the end, you will be prompted to save the certificate. Save and wait for registration to complete.

Now you just need to click on the new message icon and click "Add contact" in the menu that appears.

Enter the address of the contact.

And authenticate it with one of the methods we have already listed.
incashwetrust.biz