The most common questions we get are answered here. If you have a question for us that you think should appear in this list that doesn't, send an email to the support mailing list with your suggestion: [email protected]
Tox protects your privacy by:
Look in the profile or settings panel of your client to get your Tox ID which should look something like:
56A1ADE4B65B86BCD51CC73E2CD4E542179F47959FE3E0E21B4B0ACDADE51855D34D34D37CB5
Give yours to your friend and get your friend to add it. That's it.
If you remove someone from your contacts list, they will see you go offline, as if you closed your client normally. They can't communicate with you any longer until you add them to your contacts list again.
Tox makes no attempt to cloak your IP address when communicating with friends, as the whole point of a peer-to-peer network is to connect you directly to your friends. A workaround does exist in the form of tunneling your Tox connections through Tor. However, a non-friend user cannot easily discover your IP address using only a Tox ID; you reveal your IP address to someone only when you add them to your contacts list.
See Also: What is stopping people from tracking me through the public DHT (advanced).
No. That said, in some situations a client will choose to use publicly listed bootstrap nodes to find their way into the DHT.
Tox uses the cryptographic primitives present in the NaCl crypto library, via libsodium. Specifically, Tox employs curve25519 for its key exchanges, xsalsa20 for symmetric encryption, and poly1305 for MACs.
Check out our public nodes list for an updated list, including machine-readable JSON output.
Opus for audio, and VP8 for video.
Tox does not make use of SIP.
Tox generates a temporary public/private key pair used to make connections to non-friend peers in the DHT. Onion routing is used to store and locate Tox IDs, to make it more difficult to, for example, associate Alice and Bob together by who they are looking for in the network.