The future of online communications.
Go to file
iphydf d9f37e4c33
Duplicate tox_test to 4 other files.
In a next step, we will remove tests from each file to have a per-binary
split of tests. This will help identify which tests fail most often on
Travis CI.

In another future step, we will split the large one_test into several
auto tests, which will make testing quite a bit slower (adding about 10
seconds setup time to each), but hopefully a lot more stable ("Tox went
offline" should not happen as much anymore).
2016-10-06 16:46:35 +01:00
auto_tests Duplicate tox_test to 4 other files. 2016-10-06 16:46:35 +01:00
build Fix include paths 2016-01-01 20:28:48 -05:00
cmake Rebuild apidsl'd headers in cmake. 2016-10-02 23:54:03 +01:00
dist-build Removed unnecessary parameters 2014-08-25 10:00:09 +04:00
docs Rebuild apidsl'd headers in cmake. 2016-10-02 23:54:03 +01:00
m4 Build system now automatically enables epoll support in TCP server 2014-07-17 20:44:49 -04:00
other Set log level for DEBUG=ON to LOG_DEBUG. 2016-10-06 15:15:42 +01:00
super_donators Added my pixfile! 2015-12-12 20:40:57 +01:00
testing Import the hstox SUT interface from hstox. 2016-10-01 02:13:34 +01:00
toxav Rebuild apidsl'd headers in cmake. 2016-10-02 23:54:03 +01:00
toxcore Use socklen_t instead of unsigned int in call to accept. 2016-10-06 11:53:53 +01:00
toxdns Remove return after no-return situation (and other cleanups). 2016-09-30 19:06:44 +01:00
toxencryptsave v0.0.0 => v0.0.1 2016-09-28 12:12:39 -07:00
.gitignore Add and use CMake build script 2016-08-12 01:13:11 +01:00
.travis.yml Allow the OSX build to fail on travis. 2016-09-22 14:46:51 +01:00
autogen.sh Some configuration/build fixes, so building basicaly everything else than the library can be disabled 2013-10-07 02:01:16 +02:00
CMakeLists.txt Set log level for DEBUG=ON to LOG_DEBUG. 2016-10-06 15:15:42 +01:00
configure.ac v0.0.0 => v0.0.1 2016-09-28 12:12:39 -07:00
COPYING Removed the unused autotools files 2015-10-05 15:18:55 -07:00
DONATORS If we receive a packet from a node we are searching for, ping it. 2015-12-08 15:43:03 -05:00
INSTALL.md docs(INSTALL): update compiling instructions for Linux 2016-09-30 08:23:22 +01:00
libtoxav.pc.in Build system fixes. 2014-12-18 10:04:31 -05:00
libtoxcore.pc.in Build system fixes. 2014-12-18 10:04:31 -05:00
Makefile.am Fixed make dist. 2015-06-24 21:03:16 -04:00
README.md Update readme with tentative roadmap, removed old todo.md 2016-08-14 12:03:26 -07:00
tox.spec.in Add spec file for rpm generation 2015-03-04 00:35:25 +01:00

Project Tox


Current build status: Build Status Current Coverage: Coverage Status

Website | Wiki | Blog | FAQ | Binaries/Downloads | Clients | Compiling

IRC Channels: #tox@freenode, #toktok@freenode

Q&A:

What is Tox?

Tox is a fully encrypted, censor resistant, private, distributed network library with a focus on personal communications.

No, really, what's Tox?

It's a VERY secure Instant Messenger that supports Text, Audio/Video calls, group chats, audio group chats, and file transfers.

What are your goals with Tox?

We want Tox to be as simple as possible while remaining as secure as possible.

Toxcore Roadmap

This Roadmap is somewhat tentative, but should give you a good idea of where we're going, and where we've been.

Currently unsorted, the following is intended to function as a discussion guide to developers/contributors.

In Progress

  • 100% unit testing
  • Make toxcore stateless
  • Allow a single toxcore instance to handle multiple keypairs
  • Implement usable group chats
  • Improve A/V implementation
  • Multiple device support
  • Consistent naming scheme throughout toxcore

Done

  • Create Toxcore
  • Create DHT
  • Create Onion
  • Implement Crypto
  • Create Messenger

Documentation:

The Complex Stuff:

UDP vs. TCP

Tox must use UDP simply because hole punching with TCP is not as reliable. However, Tox does use TCP relays as a fallback if it encounters a firewall that prevents UDP hole punching.

Connecting & Communicating

Every peer is represented as a byte string (the public key [Tox ID] of the peer). By using torrent-style DHT, peers can find the IP of other peers by using their Tox ID. Once the IP is obtained, peers can initiate a secure connection with each other. Once the connection is made, peers can exchange messages, send files, start video chats, etc. using encrypted communications.