Invisible.im aims to allow people to have online chats but leave little digital forensic evidence Security researchers have a working prototype of an instant messaging application that aims to thoroughly obscure and scrub evidence that two parties have been chatting.The Invisible.im project, which is looking for developers, aims to solve a difficult security problem of online messaging services: metadata, or information about other data that can give law enforcement and governments leads on people they’re investigating.Even if an IM conversation between two people is encrypted, a determination that two people merely communicated can be enough for authorities to ask a court for warrants for other information that could eventually compromise their conversations.That information could come from buddy lists or instant messaging servers that broker conversations and log information. “Invisible.im makes it possible for any member of the public to communicate with a journalist (or indeed, anyone) without leaving a retrospectively recoverable forensic trail behind on third-party servers,” according to the project’s website.Invisible.im was launched by IT security analyst Patrick Gray; HD Moore, chief research officer of the security company Rapid7; the vulnerability researcher known as “The Grugq” and another researcher, Ducktor Richö. The foundation of Invisible.im is built around XMPP, the widely used chat protocol. But rather than using servers across the Internet to broker the transfer of messages, Invisible.im sets up a local XMPP server on a user’s computer.That local XMPP server then connects to a TOR hidden service. TOR is short for The Onion Router, an anonymity network that encrypts Internet traffic in order to give greater privacy to a Web browser. TOR can also be used to set up a “hidden” website, or one hosted on the network whose true IP address is masked.Chats are encrypted using OTR, or Off The Record, an encryption plugin. Invisible.im will use “ephemeral” encryption keys for those OTR sessions, which are scrubbed when the chat session ends. Chats will also have another layer of encryption by virtue of using TOR.An “anonymous” mode of Invisible.im will allow a person to contact another person, for example, by downloading Invisible.im and then entering the hidden service address of the person. The project is considering creating an address book so people can find the verifiable addresses of others they wish to contact.A more secure mode will allow two people who have been cryptographically verified to chat. In that mode, “no one can tell they are on each other’s ‘buddy lists’ or that they have ever had a conversation, let alone when,” according to the project’s website.It means authorities will not be able to infer relationships between users of the program by passively observing internet traffic, it said. Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe