How it works
Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging apps, Briar doesn’t rely on a central server - messages are synchronized directly between the users’ devices. If the internet’s down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the internet’s up, Briar can sync via the Tor network, protecting users and their relationships from surveillance.
Briar provides private messaging, public forums and blogs that are protected against the following surveillance and censorship threats:
- Metadata surveillance. Briar uses the Tor network to prevent eavesdroppers from learning which users are talking to each other. Each user’s contact list is encrypted and stored on her own device.
- Content surveillance. All communication between devices is encrypted end-to-end, protecting the content from eavesdropping or tampering.
- Content filtering. Briar’s end-to-end encryption prevents keyword filtering, and because of its decentralized design there are no servers to block.
- Takedown orders. Every user who subscribes to a forum keeps a copy of its content, so there’s no single point where a post can be deleted.
- Denial of service attacks. Briar’s forums have no central server to attack, and every subscriber has access to the content even if they’re offline.
- Internet blackouts. Briar can operate over Bluetooth and Wi-Fi to keep information flowing during blackouts.
Briar is designed to resist surveillance and censorship by an adversary with the following capabilities:
- All long-range communication channels (internet, phone network, etc) are comprehensively monitored by the adversary.
- The adversary can block, delay, replay and modify traffic on long-range communication channels.
- The adversary has a limited ability to monitor short-range communication channels (Bluetooth, WiFi, etc).
- The adversary has a limited ability to block, delay, replay and modify traffic on short-range communication channels.
- The adversary can deploy an unlimited number of devices running Briar.
- There are some users who can keep their devices secure - those who can’t are considered, for the purposes of the threat model, to be controlled by the adversary.
- The adversary has a limited ability to persuade users to trust the adversary’s agents - thus the number of social connections between the adversary’s agents and the rest of the network is limited.
- The adversary can’t break standard cryptographic primitives.
Our long-term plans go far beyond messaging: we’ll use Briar’s data synchronization capabilities to support secure, distributed applications including crisis mapping and collaborative document editing. Our goal is to enable people in any country to create safe spaces where they can debate any topic, plan events, and organise social movements.