Generated by GPT-5-mini| Off-the-Record Messaging | |
|---|---|
| Name | Off-the-Record Messaging |
| Title | Off-the-Record Messaging |
| Developer | Silvia Hagen, Ian Goldberg, Nikita Borisov, Eric Rescorla |
| Released | 2004 |
| Programming language | C, C++, Python, Java |
| Operating system | Microsoft Windows, macOS, Linux, Android (operating system) |
| License | GPLv2, MIT License |
Off-the-Record Messaging is a cryptographic protocol and set of practices for providing private online conversations between individuals using instant messaging, chat, and similar services. It emphasizes authentication, encryption, deniability, and forward secrecy in real-time communications across systems such as XMPP, AOL Instant Messenger, ICQ, Skype, and WhatsApp. The protocol has informed designs in projects associated with Cryptography Research, Electronic Frontier Foundation, Open Whisper Systems, and academic groups at University of Waterloo, University of Pennsylvania, and Johns Hopkins University.
Off-the-Record Messaging was developed to address privacy shortcomings in existing messaging systems such as IRC, AIM, MSN Messenger, Yahoo! Messenger, and enterprise platforms like Microsoft Exchange chat and Lotus Notes. Its goals align with advocacy by Privacy International, technical recommendations from IETF, and legal discussions involving Electronic Privacy Information Center and American Civil Liberties Union. The design targets threats exemplified by historical surveillance programs referenced in investigations involving National Security Agency, GCHQ, and reporting by The New York Times, The Guardian, and ProPublica.
The protocol emerged from academic work at University of Toronto and University of Waterloo in the early 2000s and was formalized by researchers including Ian Goldberg, Nik Cubrilovic, Siliva Hagen, and others with input from engineers tied to OpenPGP and PGP Corporation. Early demonstrations at conferences such as Usenix Security Symposium, ACM CCS, and NDSS introduced the concepts to practitioners at Microsoft Research, IBM Research, and Bell Labs. Adoption accelerated when client projects like Pidgin, Adium, Gajim, Jitsi, and later Signal incorporated OTR concepts, while standards work at IETF influenced later protocols such as OMEMO and Double Ratchet Algorithm.
The protocol combines authenticated key exchange and symmetric encryption with mechanisms inspired by Diffie–Hellman key exchange, AES, and SHA-1 or later SHA-256 hashing, integrating features similar to PGP session establishment and techniques explored in papers from Stanford University, MIT, and UC Berkeley. It uses an authenticated Diffie–Hellman handshake akin to protocols described by Whitfield Diffie and Martin Hellman and incorporates replay protection approaches studied at IETF TLS Working Group. The design employs short-lived session keys and periodic rekeying to provide forward secrecy comparable to constructions in Signal Protocol and cryptographic analyses from Cryptography Research labs.
Off-the-Record Messaging emphasizes four central properties: encryption, authentication, deniability, and forward secrecy. Encryption uses symmetric ciphers like AES while authentication can leverage Public-key cryptography primitives familiar from X.509 and OpenPGP. Deniability draws on concepts from debates involving Paul Syverson and David Chaum concerning anonymous protocols and meets criticisms raised in literature from Oxford University and Harvard University. Forward secrecy critiques and improvements relate to findings by Bruce Schneier, Silvio Micali, and papers published at CRYPTO and Eurocrypt.
Implementations appeared in open-source clients such as Pidgin, Adium, Gaim, Gajim, and library projects used by Jitsi and libpurple-based software, as well as ports for Android (operating system), iOS, and desktop environments tied to GNOME and KDE. Commercial and research tools in which OTR concepts influenced design include WhatsApp, Signal, Telegram Messenger, Wire, and integrations by teams at Google and Facebook. Academic implementations for study were developed at Carnegie Mellon University, ETH Zurich, and University College London.
Critics from EFF-aligned researchers and analysts at Stanford University and Princeton University noted limitations: reliance on authenticated user keys can be undermined by metadata leaks observed in work by Edward Snowden, while deniability assumptions face contestation in papers from Columbia University and University of Cambridge. Interoperability issues surfaced between clients like Pidgin and Adium and standards-driven deployments in XMPP Standards Foundation ecosystems, echoing debates at IETF. Scalability and usability problems were highlighted by teams at Mozilla Foundation and Red Hat during enterprise trials.
OTR's properties intersect with legal frameworks and debates involving Fourth Amendment to the United States Constitution litigation, European rulings from the European Court of Human Rights, and regulation through instruments like General Data Protection Regulation and rulings from national bodies such as Federal Communications Commission and Office of the Privacy Commissioner of Canada. Advocacy groups including Privacy International, Electronic Frontier Foundation, and ACLU cite OTR and similar technologies in briefs related to lawful interception, surveillance reform, and whistleblower protections featured in cases involving Chelsea Manning, Edward Snowden, and litigation with Department of Justice. Courts and legislators in jurisdictions such as United Kingdom, Germany, and France have debated standards for compelled disclosure, retention mandates, and the balance between encryption and lawful access.
Category:Cryptographic protocols