Welcome to our source page!

TORFone Source code based on the source code of PGPfone 2.1 for Windows published by Philip Zimmermann in 1999.

Major changes:

  • Used TCP-transport instead of UDP. Added 2-byte length header to the top of each data packet;
  • Added ability to select the address and port of listener interface settings;
  • Added SOCKS5 proxy support to work through Tor;
  • Used the extra 32-packets buffer to compensate jitter of the Tor tunnel. Initial buffer filling (defining additional voice latency) automatically adjusted depending on the tunnel's quality and can also be set manually;
  • Added safe text message feature (crypto chat). Enabled the safe file transfer feature (was disabled in the original PGPFone);
  • Localized initialization file (now the settings are saved in the current folder).
  • Added address book file support
  • Added AES256 in CTR and OCB (128 bit MAC) modes, anti-MitM autentification using PKDF2 and HMAC, ñorrected generation of keys from common secret (now PKDF2 used), CSPRNG and words list generation (now HMAC instead of SHA1 used)
  • Added new codecs: MELPE, MELP, CODEC2, OPUS and GSP 06.10 from SpeakFrealy in various modes, noise preprocessor NPP7 and professional security vocoder based on LPC algo
  • Hides variable bitrate of OPUS codec and fixes message lenth
  • Added new intelligent PTT and VOX modes for prevention the loss of end of the phrase
  • Added Tor/direct UDP switch during call
  • Added STUN protocol support for NAT traversal using Tor
  • Added back-connection to Hidden Service of caller and automatically rebuilding slowest Tor circuits for decreasing latency

Version 1.1b is not compatible with earlier versions of 0.Xa, since the changes were made in cryptography to improve privacy

To compile the source code using Visual Studio 6.0 under Windows XP without any additional external or pre - builded libraries.

The compiled project should work on the entire line of Windows above Windows 98. I tested it under Windows XP, Windows 7 and Windows 8. It also works under virtual Windows XP from live CD with network and audio support and also under Linux using Wine.

About I2P

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. More…

I2P unlike TOR can create UDP-tunnels (streamr) between users. By the description these tunnels shall be suitable for VOIP. Now I'm testing I2P tunnels for use with I2PFone but has not yet received acceptable results due to the large jitter and significant violations of the delivery order of UDP-packets. In case of a successful solution to this problem I will tell the results on this site.

Other good tools

Here are links to some useful portable open source utilities to protect your confidentiality and anonymity.


Mixminion is the standard implementation of the Type III anonymous remailer protocol. Mixminion can send and receive anonymous e-mail. Mixminion uses a mix network architecture to provide strong anonymity, and prevent eavesdroppers and other attackers from linking senders and recipients. Volunteers run servers (called "mixes") that receive messages, decrypt them, re-order them, and re-transmit them toward their eventual destination. Every e-mail passes through several mixes so that no single mix can link message senders with recipients. More…


Pidgin - modular instant messaging client. Supports the most popular protocols: Bonjour iChat, Gadu-Gadu, XMPP (Google Talk, LJ Talk, Gizmo5), ICQ, Internet Relay Chat (IRC), .NET Messenger Service (MSN), Novell GroupWise, OpenNAP, OSCAR (AIM/ICQ), SILC, Mail.ru Agent, Yahoo! Messenger, Zephyr, Lotus Sametime, Session Initiation Protocol (SIP), MySpaceIM. Pidgin supports encryption of messages using the OTR-plugin and can work through anonymizing proxies, including a TOR and I2P networks. More…

OTR Plagin

Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing: Encryption (No one else can read your instant messages), Authentication (You are assured the correspondent is who you think it is), Deniability (The messages you send do not have digital signatures that are checkable by a third party.) Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages he sees are authentic and unmodified. Perfect forward secrecy. If you lose control of your private keys, no previous conversation is compromised. More…


TrueCrypt is free open-source disk encryption software creates a virtual encrypted disk within a file and mounts it as a real disk. Encryption is automatic, real-time (on-the-fly) and transparent. Also provides plausible deniability in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system. More…


Cr!ptAES (read Cript-AES) is a free and easy to use GUI tool to encrypt files. Cr!ptAES comes handy to send encrypted files over the Internet, or over a private network, or just to protect sensitive local files with a password. More…


GPG4USB is a very easy to use and small portable editor to encrypt and decrypt any text-message or -file you want. More…


OpenPuff is a professional steganography OpenSource core (crypto-library libObfuscate) tool provided HW seeded random number generator (CSPRNG), Deniable steganography, Carrier chains (up to 256Mb of hidden data), Carrier bits selection level, Modern multi-cryptography (16 algorithms), Multi-layered data obfuscation (3 passwords) and X-squared steganalysis resistance. OpenPuff supports many carrier formats: Images (BMP, JPG, PCX, PNG, TGA), Audio support (AIFF, MP3, NEXT/SUN, WAV), Video support (3GP, MP4, MPG, VOB), Flash-Adobe support (FLV, SWF, PDF). More…


Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. It works with any drive that works with Windows. Secure drive erasure methods are supported out of the box. Erases files, folders and their previously deleted counterparts. Works with an extremely customisable Scheduler. More…