I’ve spent the last few weeks working on a side project called TorChat. I wanted a way to chat with a friend that was truly ephemeral—no central servers, no logs, and no metadata trail left behind and ofcourse terminal based .
How it works:
Host Mode: It launches its own isolated Tor instance and creates a temporary Hidden Service. It generates a one-time chat:// invite URL with a random token.
Encryption: Uses ChaCha20-Poly1305 (AEAD) for end-to-end encryption.
Ephemeral: As soon as you close the app, the private keys and the .onion address are wiped from the temp directory. It’s like the chat never existed.
I just packaged it as an AppImage to make it easier to run on Linux without messing with dependencies.
I'm looking for some honest feedback on:
The UX: Is the QR code/invite link flow intuitive?
Security: I used cryptography primitives, but I’d love for more eyes to look at the logic.
Tor Stability: How fast is the bootstrap for you?
It’s totally open-source. If you’re into privacy tools or P2P networking, I’d love for you to check it out and let me know what you think!
GitHub: https://github.com/blackXploit-404/torchat
Cheers!
Top comments (0)