Briar: Peer to Peer Encrypted Messaging
Platform support and iOS constraints
- Many notice Briar is Android-only and question lack of iOS and recent public updates.
- Several argue Android focus is rational given limited resources and Briar’s target audience.
- Technical explanations: iOS aggressively kills background apps and forbids the kind of persistent background networking Briar and Tor need; also no JIT for JVM-based code and no process forking for a separate Tor process.
- Some note that a few iOS apps can run in the background via specific APIs (audio, location), but this is seen as a narrow carve‑out, not a general solution for Briar‑style messaging.
Security model and cryptography
- Users like Briar’s strong threat model, Tor integration, and metadata minimization; it’s described as “insanely privacy focused.”
- There are questions whether Briar uses a double ratchet; docs claim forward secrecy but don’t clearly mention ratcheting.
- A side thread debates PGP vs modern protocols: critics call PGP outdated for messaging (no default forward secrecy), recommending Signal‑style ratchets instead; others highlight ongoing work to add forward secrecy to PGP.
- One commenter critiques reliance on “standard cryptographic primitives” and suggests nonstandard schemes; others push back, emphasizing public scrutiny and competitions over “homebrew” crypto.
P2P, mesh, and offline communication
- Briar’s ability to sync over Bluetooth, Wi‑Fi, and even SD cards is widely praised, especially for censorship, disasters, or no‑internet scenarios.
- Real‑world stories: it worked well as Bluetooth chat on a plane for some, poorly for others.
- Clarification: despite marketing language, Briar today is not a full mesh network; phones relay only within limited topologies, partly due to OS changes and DoS/metadata concerns.
- There’s an extended debate about whether large‑scale, relay‑based mesh over short‑range links can practically scale without flooding or routing problems.
Alternatives and ecosystem comparisons
- Comparisons include DeltaChat, Signal, Session, SimpleX, Ricochet, Cwtch, Secure Scuttlebutt, Firechat, Meshtastic, and Reticulum.
- DeltaChat and Session get praise for usability and multi‑platform support, but are critiqued for PGP‑style crypto or lack of forward secrecy.
- Meshtastic and Reticulum are cited as more “network‑layer” approaches (LoRa, radio, multi‑interface overlay); some find Reticulum especially promising but worry it’s mostly a one‑person Python project.
- Android’s openness (F‑Droid, de‑Googled ROMs, sideloading) is viewed as aligning better with this ecosystem; iOS is seen as a hard wall for truly decentralized tools, though network effects of iOS still hurt adoption.
Usability, adoption, and missing features
- Adoption is perceived as low, limiting any P2P/mesh benefits; many peers simply don’t run Briar.
- Pain points: no multi‑device account, limited “one‑to‑many” broadcast features, forum UX (no edit/delete, weak threading), and QR‑only pairing.
- Others praise Briar’s simplicity and offline app‑sharing feature (Wi‑Fi hotspot / local APK) as a strong preparedness tool if installed in advance.
Legal and trust discussions
- Some worry about funding links (e.g., Open Technology Fund / US‑state‑related bodies), while others note many respected privacy projects share similar funding.
- On legality, commenters generally believe strong end‑to‑end crypto and P2P messaging remain legal in most “Western” jurisdictions, though vendors may face cooperation orders and, in the UK, compelled key disclosure.