Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
users:techfaq [2015/09/07 23:45] cmotc [What is stopping people from tracking me through the public DHT?] |
users:techfaq [2015/09/07 23:51] cmotc |
||
---|---|---|---|
Line 8: | Line 8: | ||
Tox users are connected by a modified version of [[https:// | Tox users are connected by a modified version of [[https:// | ||
- | It consists of a [[https:// | + | It consists of a [[https:// |
Tox is just the core, the part of the program which handles the messages and encryption, for instance. But it can only function in the context of a complete instant messaging program. All the fancy user interfaces you see all over the place, are the clients. The client is a separate program which utilizes the core, providing a convenient way to use the program. So when you use Tox, you are in fact using one of the clients. The most clients are graphical clients, in other words, you will make use of all kinds of graphical elements which are part of the client. You usually won't get to see the core (unless you look into the source on GitHub). There are various clients available which each have a different name, are independent from each-other, in various programming languages. | Tox is just the core, the part of the program which handles the messages and encryption, for instance. But it can only function in the context of a complete instant messaging program. All the fancy user interfaces you see all over the place, are the clients. The client is a separate program which utilizes the core, providing a convenient way to use the program. So when you use Tox, you are in fact using one of the clients. The most clients are graphical clients, in other words, you will make use of all kinds of graphical elements which are part of the client. You usually won't get to see the core (unless you look into the source on GitHub). There are various clients available which each have a different name, are independent from each-other, in various programming languages. | ||
Line 28: | Line 28: | ||
Thanks to [[https:// | Thanks to [[https:// | ||
- | == Which encryption algorithms does Tox employ? == | + | === Which encryption algorithms does Tox employ? |
Tox uses the encryption algorithms present in the [[http:// | Tox uses the encryption algorithms present in the [[http:// | ||
Line 35: | Line 35: | ||
More info: https:// | More info: https:// | ||
- | == How does Tox's Encryption compare to OTR? == | + | === How does Tox's Encryption compare to OTR? === |
The encryption used in Tox not only provides same features as OTR, but is also the default, and only operation mode of Tox. | The encryption used in Tox not only provides same features as OTR, but is also the default, and only operation mode of Tox. | ||