Mesh

Get a secure, anonymous, peer-to-peer instant messenger

One messenger for Internet and LAN chat with end-to-end encryption

Version 1.1 (alpha)

Windows (Setup)
(.NET Framework v4.6.1)
Windows (Standalone)
(.NET Framework v4.6.1)
Open Source
Source code available under GNU GPLv3 Licence on  GitHub
File Details
NameMeshSetup.zip
FormatZIP File
Size6.22 MB
SHA256DEEFE59BD11228485D3DE56D6049919A26C1668A921FF5FB7D8E745E9AE15B47
NameMeshPortable.zip
FormatZIP File
Size6.52 MB
SHA25687BA0E05B2372AC2F8FFDFA2B18B932A497879A0D4D45E64F6CFECB606E52D39
Technitium Mesh

Technitium Mesh is a secure, anonymous, peer-to-peer (p2p), open source instant messenger designed to provide end-to-end encryption. Primary aim of developing this instant messenger is to provide privacy which is achieved using cryptography and anonymity using Tor network. It can be used over Internet and private LAN networks (without Internet) for instant messaging and file transfer with support for private chats and group chats.

Mesh is based on Bit Chat and is its successor. Mesh takes core ideas from its predecessor and removes a few. Notably, Mesh does not require centralized user registration and provides anonymous profile support using Tor hidden service. It also removes use of BitTorrent trackers for finding peers which was causing issues with Bit Chat since some ISPs blocking BitTorrent traffic would also block Bit Chat traffic. Instead, Mesh relies only on Distributed Hash Tables (DHT) for all purposes.

Mesh allows creating both pure p2p and anonymous profiles with support for running multiple profiles concurrently. Both p2p and anonymous profiles are interoperable such that a p2p profile user can connect with an anonymous profile user via Tor Network.

With Mesh, there is no meta data generated. User identifier is designed in such a way that it can be changed anytime to hide identity. Since, there is no user registration, we don't know who uses Mesh or how many people use it. In p2p mode, the connections use IPv4 or IPv6 connectivity directly to connect with peers without any server in between. With anonymous mode, all connectivity occurs over Tor network and uses Tor hidden service to accept inbound connections.

Click here to read Frequently Asked Questions (FAQ).

Peer-to-Peer

  • Serverless, peer-to-peer architecture that uses Distributed Hash Tables (DHT).
  • No meta data is stored since even we don't know to whom you are chatting with.
  • Works as LAN chat just as it works on the Internet.
  • Works in private LAN networks not connected to Internet.
  • Anonymous profiles use Tor Network to hide your identity.

Secure

  • Uses RSA 2048 bit keys to generate profiles.
  • Provides end-to-end encryption with Perfect Forward Secrecy (PFS) using DHE-2048 or ECDHE-256.
  • Protocol is secured with AES 256-bit encryption with Authenticated Encryption.
  • Changeable user identifier to hide identity.
  • Open source implementation allows you to inspect the code.

Why Is Privacy Important?

Watch this episode of Last Week Tonight with John Oliver: Government Surveillance (HBO) in which John sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics. You may wish to skip to 13:38 in the video to jump to the interview.

"Your rights matter because you never know when you're going to need them."
- Edward Snowden

Alpha Version

Technitium Mesh current release is in alpha version. This means the software is not fully complete and will undergo major changes in its protocol or user interface design. There may be noticable bugs which will be addressed with an automatic update. You are welcome to report any issues by sending an email to support@technitium.com

Become A Patron

Make contribution to Technitium by becoming a Patron and help making new software, updates, and features possible.

Become A Patron Now!