Briar is a messaging app designed for activists, journalists, and anyone
else who needs a safe, easy and robust way to communicate. Unlike
traditional messaging apps, Briar doesn’t rely on a central server –
messages are synchronized directly between the users’ devices. If the
Internet’s down, Briar can sync via Bluetooth, Wi-Fi or memory cards, keeping the
information flowing in a crisis. If the Internet’s up, Briar can sync
via the Tor network, protecting users and their relationships from
surveillance.
Users who are online at different times can use Briar
Mailbox to deliver their messages securely.
The quick start guide and
the manual describe how to use Briar
and the features that are available. Technical details are available on
the wiki
and explained in this video.
Briar provides private messaging, public forums and blogs that are
protected against the following surveillance and censorship threats:
Metadata surveillance. Briar uses the Tor network to prevent
eavesdroppers from learning which users are talking to each other.
Each user’s contact list is encrypted and stored on her own device.
Content surveillance. All communication between devices is
encrypted end-to-end, protecting the content from eavesdropping
or tampering.
Content filtering. Briar’s end-to-end encryption prevents
keyword filtering, and because of its decentralized design there are
no servers to block.
Takedown orders. Every user who subscribes to a forum keeps a
copy of its content, so there’s no single point where a post can
be deleted.
Denial of service attacks. Briar’s forums have no central server
to attack, and every subscriber has access to the content even if
they’re offline.
Internet blackouts. Briar can operate over Bluetooth and Wi-Fi
to keep information flowing during blackouts.
Briar is designed to resist surveillance and censorship by an adversary
with the following capabilities:
All long-range communication channels (internet, phone network, etc)
are comprehensively monitored by the adversary.
The adversary can block, delay, replay and modify traffic on
long-range communication channels.
The adversary has a limited ability to monitor short-range
communication channels (Bluetooth, WiFi, etc).
The adversary has a limited ability to block, delay, replay and
modify traffic on short-range communication channels.
The adversary can deploy an unlimited number of devices
running Briar.
There are some users who can keep their devices secure - those who
can’t are considered, for the purposes of the threat model, to be
controlled by the adversary.
The adversary has a limited ability to persuade users to trust the
adversary’s agents - thus the number of social connections between
the adversary’s agents and the rest of the network is limited.
The adversary can’t break standard cryptographic primitives.
Our long-term plans go far beyond messaging: we’ll use Briar’s data
synchronization capabilities to support secure, distributed applications
including crisis mapping and collaborative document editing. Our goal is
to enable people in any country to create safe spaces where they can
debate any topic, plan events, and organise social movements.