Skip to content

Quiet FAQ

holmesworcester edited this page Jun 28, 2022 · 28 revisions

Is Quiet using its own servers?

No! We don't want your data or your metadata.

Is Quiet “federated”? Do I need to set up a server?

No! We don't believe in forcing users to choose between running their own server and trusting someone else's, so we made Quiet fully peer-to-peer.

Does Quiet use servers at all?

Quiet uses the Tor network. Those are servers in a sense, but they relay encrypted data given the protections established by Tor. Quiet also uses Github to deliver updated versions of Quiet. Other than that, Quiet is fully peer-to-peer.

Do Quiet connect to each other over Tor?

Yes. Via Tor onion addresses.

Do peers ever connect to each other without Tor?

No. The only time Quiet connects to the Internet without Tor is to check for app updates and download them.

What protocol do peers connect with?

Members of a Quiet community (analogous to a Slack organization or a Discord "server") use libp2p/IPFS to connect to each other, in an insular network for a specific community.

Does Quiet ever connect to a global IPFS network?

No. Each community creates its own totally isolated IPFS network, with members connecting over Tor.

Are connections authenticated?

Yes. Community members must have a valid certificate to connect to other peers.

Are onion addresses revealed to any non-community members?

No.

Are onion addresses guessable?

No. Quiet uses v3 onion addresses, which are not guessable.

Does Quiet ever use IP addresses to connect to peers?

No, only Tor onion addresses.

Why does Quiet use Tor? Do you really need anonymity and censorship resistance?

Quiet uses Tor for basic privacy protection, for metadata privacy, for reliability, and for decentralization.

Why is Tor necessary for basic privacy protection in a peer-to-peer app?

If not done carefully, decentralized tools can quickly become less private than centralized alternatives. Tor is essential to achieving a baseline level of privacy in Quiet because it gives us clear guarantees that make reasoning about the privacy properties of the overall system much easier.

IP addresses can reveal a lot of information. They could reveal where you live, where you are now, and your approximate movements throughout the day, as well as your institutional affiliation if you are connecting via an academic or company network. In a centralized messaging app, everyone connects through a central server, so this information is only revealed to the server, which can use it responsibly. They might reveal it to advertisers or government, but not to random users. However, in a peer-to-peer network, an IP address could easily be revealed to many or all random users.

A user of a messaging app would not expect to reveal their approximate location, educator, and/or employer to other random users. Nor would they expect to be sued by a copyright troll over an image posted by someone else. But a decentralized messaging app that exposes user IP addresses could do both of these things.

Without something like Tor (or a VPN) a decentralized messaging app would be less private and worse than its centralized competitor, leaking this sensitive IP address information. As everyone who has ever received a warning letter for using Bittorrent knows, this can be quite an unpleasant surprise. Decentralized apps need Tor (or something like it) not for "dark web" style anonymity—they need it to just maintain parity with the built-in privacy of centralized apps like Slack and Discord.

Clone this wiki locally