How it’s built
Using tor as transport layer for P2P
routing and provide anonymity (no
exit nodes used).
Obfuscated as HTTPS trafﬁc to
prevent gov’t ﬁltering.
Using OTR v3.1 to ensure perfect
forward secrecy and end-to-end
Capable of detecting A5/GSM
tactical surveillance attacks.
Extremely effective anti forensic
mechanisms and triggers