||This article appears to be written like an advertisement. (October 2014)|
Screenshot of Cryptocat 2.1.5
|Original author(s)||Nadim Kobeissi|
|Developer(s)||Cryptocat contributors |
|Initial release||19 May 2011|
|Stable release||2.2.2 / June 12, 2014|
|Available in||English, Arabic, Bulgarian, Burmese, Catalan, Chinese, Danish, Dutch, Farsi, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Latvian, Norwegian, Polish, Portuguese, Romanian, Russian, Slovenian, Spanish, Swedish, Tibetan|
|License||Affero General Public License|
Cryptocat is an open source web and mobile application intended to allow secure, encrypted online chatting. Cryptocat uses end-to-end encryption and encrypts chats on the client side, only trusting the server with data that is already encrypted. Cryptocat is offered as an app for Mac OS X or as a browser extension for Google Chrome, Mozilla Firefox, Apple Safari, Opera and as a mobile app for iPhone.
Cryptocat's stated goal is to make encrypted communications more accessible to average users. The chat software aims to strike a balance between security and usability—offering more privacy than services such as Google Talk or Internet Relay Chat, while maintaining a higher level of accessibility than Pidgin.
Cryptocat is developed by the Cryptocat team and is released under the GPLv3 license.
Cryptocat developer Nadim Kobeissi said he was detained and questioned at the U.S. border by the DHS in June 2012 about Cryptocat's censorship resistance. He tweeted about the incident afterwards, resulting in media coverage and a spike in the popularity of the software.
In June 2013, security researcher Steve Thomas pointed out a security bug that could be used to decrypt any group chat message that had taken place using Cryptocat between September 2012 and April 19, 2013. Private messages were not affected, and the bug had been resolved a month prior. In response, Cryptocat issued a security advisory and requested that all users ensure that they had upgraded. They also informing users that past group conversations may have been compromised.
In February 2014, an audit by iSec Partners criticized Cryptocat's authentication model as insufficient. In response, Cryptocat made improvements to user authentication, making it easier for users to authenticate and preventing man-in-the-middle attacks.
Along with Threema and Surespot, Cryptocat was ranked first in a study evaluating the security and usability of instant messaging encryption software, conducted by the German PSW Group in June 2014.
In November 2014, Cryptocat received a top score on the Electronic Frontier Foundation's secure messaging scorecard, along with "ChatSecure + Orbot", TextSecure, "Signal / RedPhone", Silent Phone, and Silent Text.
Cryptocat allows any desktop with a modern web browser to quickly set up an end-to-end encrypted chat environment. The browser's accessibility is frequently touted by the project as the reason why it chose the platform. Cryptocat is currently compatible with Google Chrome, Mozilla Firefox, Apple Safari, Opera and also offers an application for iOS devices.
Cryptocat uses the Off-the-Record Messaging (OTR) protocol for encrypted private messaging, allowing two parties to chat in private. Cryptocat also uses its own group messaging protocol to allow for group instant messaging conversations. Since Cryptocat generates new key pairs for every chat, it implements a form of perfect forward secrecy. Cryptocat also offers encrypted file and photo sharing, allowing users to send documents and photos to each other using end-to-end encryption.
Cryptocat also may be used in conjunction with Tor in order to anonymize the client's network traffic. The project also plans to create an embedded version for use with Raspberry Pi devices for use by non-profits. As of July 2013, a Commotion-compatible version was in development.
Since 2013, Cryptocat has offered the ability to connect to Facebook Messenger to initiate encrypted chatting with other Cryptocat users. According to the developers, the feature was meant to help offer an alternative to the regular Cryptocat chat model which does not offer long-term contact lists.
Cryptocat uses the Off-the-Record Messaging (OTR) protocol for encrypted private messaging, allowing two parties to chat in private. For group messaging, Cryptocat uses a group chat protocol deploying Curve25519, AES-256, and HMAC-SHA512, all industry standards for cryptography applications. All messages sent in Cryptocat, including group chat messages and file transfers, are end-to-end encrypted, which means that they can only be read by the intended recipients and not by the network during transit. Cryptocat provides cryptographic properties of confidentiality, integrity, authentication and forward secrecy for all conversations, and also provides deniability for file transfers and private OTR chats.
Cryptocat also publishes its server configuration files and instructions for others to set up their own servers for the Cryptocat client to connect to.
Some versions of Cryptocat have been questioned for utilizing the browser to encrypt messages, which some researchers feel is less secure than the desktop environment. More recent versions have relied on browser-native random number generation.
- Cryptocat. "Cryptocat CONTRIBUTING.md". Retrieved 2014-06-22.
- Dachis, Adam (9 August 2011). "Cryptocat Creates an Encrypted, Disposable Chatroom on Any Computer with a Web Browser". Lifehacker. Retrieved 8 April 2012.
- Giovannetti, Justin (4 February 2012). "Encrypted messages: chatting safely with Cryptocat". OpenFile. Retrieved 8 April 2012.
- "Cryptocat on the Chrome Web Store". Chrome.google.com. Retrieved 2012-07-28.
- Greenberg, Andy (27 May 2011). "Crypto.cat Aims To Offer Super-Simple Encrypted Messaging". Forbes. Retrieved 8 April 2012.
- Curtis, Christopher (17 February 2012). "Free encryption software Cryptocat protects right to privacy: inventor". Montréal Gazette. Archived from the original on February 19, 2012. Retrieved 8 April 2012.
- "Using His Software Skills With Freedom, Not a Big Payout, in Mind". New York Times. April 18, 2012.
- Jon Matonis (2012-04-18). "Detaining Developer At US Border Increases Cryptocat Popularity". Forbes. Retrieved 2012-07-28.
- "Developer's detention spikes interest in Montreal's Cryptocat". Itbusiness.ca. 2012-06-08. Retrieved 2012-07-28.
- Steve Thomas. "DecryptoCat". Retrieved 2013-07-10.
- Cryptocat Development Blog. "New Critical Vulnerability in Cryptocat: Details". Retrieved 2013-07-07.
- Greenwald, Glenn (May 13, 2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books. p. 59. ISBN 978-1627790734. Retrieved 22 June 2014.
- Franceschi-Bicchierai, Lorenzo (21 November 2013). "Iran Blocks Encrypted Chat Service Despite Claims of Internet Freedom". Mashable. Retrieved 22 June 2014.
- Cryptocat. "Recent Audits and Coming Improvements". Retrieved 2014-06-22.
- Christian Heutger. "Die Ergebnisse unseres großen Messenger-Tests" (in German). Retrieved 2014-06-26.
- "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. 2014-11-04.
- Cryptocat. "Documenting and Presenting Vulnerabilities in Cryptocat". Retrieved 2014-06-22.
- Cryptocat Multiparty Protocol Specification Retrieved 2013-12-28
- Knowles, Jamillah (3 March 2012). "Raspberry Pi network plan for online free-speech role". BBC News. Retrieved 8 April 2012.
- Kirk, Jeremy (14 March 2012). "Cryptocat Aims for Easy-to-use Encrypted IM Chat". PCWorld. Retrieved 8 April 2012.
- Norton, Quinn (12 May 2014). "Cryptocat Creates an Encrypted, Disposable Chatroom on Any Computer with a Web Browser". The Daily Beast. Retrieved 22 June 2014.
- Cryptocat. "Cryptocat, Now with Encrypted Facebook Chat". Retrieved 2014-06-22.
- Cryptocat. "Server Deployment Instructions". Retrieved 2014-06-22.
- Nadim Kobeissi. "Cryptocat Network Now in Swedish Nuclear Bunker". Retrieved 2013-02-09.
- Matasano Security – Matasano Web Security Assessments for Enterprises
- HOPE 9: Why Browser Cryptography Is Bad & How We Can Make It Great on Vimeo
- "Mozilla Developer Network – window.crypto.getRandomValues"