Other names | Elixxir, PrivaTegrity |
---|---|
Developer(s) |
|
Initial release | 25 January 2022 |
Repository | https://git.xx.network/elixxir |
Operating system | |
Type | Encrypted instant messaging |
License |
|
xx messenger is a cross-platform decentralized encrypted instant messaging service developed by PrivaTegrity Corporation and running on a blockchain called xx network. Messages are delivered over a variety of mix network first described in 2016.[1] Users can send one-to-one and group messages, which can include voice notes and images.[2]
xx messenger uses usernames as identifiers which can be optionally attached to standard cellular telephone numbers or email addresses for contact discovery. All communications between users are secured with quantum-resistant end-to-end encryption.[3]
xx messenger's software is free and open-source. Its mobile clients are published under the 2-clause BSD License,[4][5] while its server software is published under a modified, patent-protected Business Source License.[6]
An alpha version of xx messenger was first presented on January 6, 2016 by David Chaum at the Real World Crypto conference with the stated goal of demonstrating a new type of mix network encryption scheme.[1] The encryption scheme, known as PrivaTegrity, was described by Chaum and team of academic partners at Purdue University, Radboud University Nijmegen, University of Birmingham, and other schools.[7]
xx messenger was released to the public as a mobile app on Android and IOS on 25 January 2022.[8]
xx messenger uses cMix - a network of decentralized servers called xx network that are run by independent operators in approximately 80 countries - for data transmission.[8] cMix attempts to address traditional latency and scalability limitations of mix networks by performing computationally expensive public-key operations between mix nodes prior to any client data being transmitted over the network. Messages sent by users of xx messenger are grouped in batches of 1,000 and routed through a subset of cMix nodes. Once the mixing process is complete, each message can be retrieved and decrypted by their recipient.[7]
The cMix protocol uses XChaCha20, BLAKE2b, HMAC-SHA-256, Diffie–Hellman key exchange, and Supersingular isogeny key exchange as cryptographic primitives.[9] Messages are encrypted in two layers. The inner layer is encrypted with ChaCha20 symmetric encryption. This payload is then encrypted once more for transmission over the mixnet using multi-party ElGamal encryption. The encryption protocols, in addition to the properties provided by the mixnet, allow both anonymity preservation and traditional end-to-end security guarantees, as well as preliminary post-quantum security with a traditional fallback mechanism.[10]