KryptEY
Keyboard for secure E2EE communication through signal protocol in any messenger
New in version 0.1.5
* Initial release
Communicate securely and independent, regardless of the legal situation or whether messengers use E2EE. No server needed. #ChatKontrolleStoppen
Why KryptEY?
Breaking of end-to-end encryption (E2EE) by laws such as the planned EU chat control is an ongoing issue. Content in messengers that use E2EE, such as Whatsapp or Signal, could thus be monitored by third parties. E2EE is often, but not always, standard in messengers. There are proven methods for E2EE such as PGP. However, these methods are sometimes cumbersomely integrated and require a lot of effort to use.
KryptEY is an Android keyboard that implements the Signal protocol. The keyboard works messenger-independently and both the X3DH Key Agreement Protocol and the Double Ratchet Algorithm work without a server, thus it enables a highly independent use of the protocol.
Features
Based upon Simple Keyboard ( https://github.com/rkkr/simple-keyboard ), KryptEY adds a view above the Keyboard for the E2EE functionality.
* use E2EE through Signal Protocol in any messenger
* encryption/decryption of messages
* enter message through separate text field in keyboard
* use clipboard to read messages
* manage contacts in own contact list in keyboard
* message log to view sent/received messages
* send messages as plain JSON (raw mode) or hidden in a decoy text (fairytale mode)
* verification of E2EE functionality via fingerprint
* Q&A View for questions
* dark & light theme
See https://github.com/amnesica/KryptEY/blob/master/KRYPTEY.md for further information on how KryptEY is working.
Security
The existing security properties for the Signal Protocol are also valid for the keyboard.
Limitations
The keyboard was designed as a POC and only allows 1-to-1 conversations. However, the application can also be used in a group chat to a limited extent. Here, a message can be directed to a specific chat partner and not to all people. Other participants of the group chat cannot decrypt the message.
Text messages in Telegram are getting copied as HTML and not as plain text. When decoding the message with the fairytale mode the copied message is compromised and can't be read properly. Therefore, it can't be decoded at all. However, the raw mode works properly. When using KryptEY with Telegram we recommend the raw mode.
Some messengers like Threema only allows up to 3500 bytes per message. Therefore, different character input limitations apply. To stay under the 3500 bytes limit, only 500 characters are allowed for raw and fairytale mode. For convenience these limitation applies for all messengers.
Demo
For a demonstration on how KryptEY is used see https://github.com/amnesica/KryptEY/tree/master#demo
KryptEY was created by mellitopia and amnesica. The code is open source and can be found at https://github.com/amnesica/KryptEY
Why KryptEY?
Breaking of end-to-end encryption (E2EE) by laws such as the planned EU chat control is an ongoing issue. Content in messengers that use E2EE, such as Whatsapp or Signal, could thus be monitored by third parties. E2EE is often, but not always, standard in messengers. There are proven methods for E2EE such as PGP. However, these methods are sometimes cumbersomely integrated and require a lot of effort to use.
KryptEY is an Android keyboard that implements the Signal protocol. The keyboard works messenger-independently and both the X3DH Key Agreement Protocol and the Double Ratchet Algorithm work without a server, thus it enables a highly independent use of the protocol.
Features
Based upon Simple Keyboard ( https://github.com/rkkr/simple-keyboard ), KryptEY adds a view above the Keyboard for the E2EE functionality.
* use E2EE through Signal Protocol in any messenger
* encryption/decryption of messages
* enter message through separate text field in keyboard
* use clipboard to read messages
* manage contacts in own contact list in keyboard
* message log to view sent/received messages
* send messages as plain JSON (raw mode) or hidden in a decoy text (fairytale mode)
* verification of E2EE functionality via fingerprint
* Q&A View for questions
* dark & light theme
See https://github.com/amnesica/KryptEY/blob/master/KRYPTEY.md for further information on how KryptEY is working.
Security
The existing security properties for the Signal Protocol are also valid for the keyboard.
Limitations
The keyboard was designed as a POC and only allows 1-to-1 conversations. However, the application can also be used in a group chat to a limited extent. Here, a message can be directed to a specific chat partner and not to all people. Other participants of the group chat cannot decrypt the message.
Text messages in Telegram are getting copied as HTML and not as plain text. When decoding the message with the fairytale mode the copied message is compromised and can't be read properly. Therefore, it can't be decoded at all. However, the raw mode works properly. When using KryptEY with Telegram we recommend the raw mode.
Some messengers like Threema only allows up to 3500 bytes per message. Therefore, different character input limitations apply. To stay under the 3500 bytes limit, only 500 characters are allowed for raw and fairytale mode. For convenience these limitation applies for all messengers.
Demo
For a demonstration on how KryptEY is used see https://github.com/amnesica/KryptEY/tree/master#demo
KryptEY was created by mellitopia and amnesica. The code is open source and can be found at https://github.com/amnesica/KryptEY
Versions
Although APK downloads are available below to give you the choice, you should be aware that by installing that way you will not receive update notifications and it's a less secure way to download. We recommend that you install the F-Droid client and use that.
Download F-Droid-
arm64-v8a
armeabi-v7a
x86
x86_64
This version requires Android 8.0 or newer.
It is built and signed by F-Droid, and guaranteed to correspond to this source tarball.
Download APK 16 MiB PGP Signature | Build Log