The most common questions we get are answered here. If you have a question for us that you think should appear in this list that doesn't, send an email to the support mailing list with your suggestion: email@example.com
Tox protects your privacy by:
Look in the profile or settings panel of your client to get your Tox ID which should look something like:
Give yours to your friend and get your friend to add it. That's it.
If you want a shorter and more memorable ID, you can use a service like ToxMe, that maps an email-address-style username to a Tox ID. However, an individual concerned about their security should avoid using these services where possible. Unfortunately, the cost of this convenient name-to-Tox ID mapping is a loss of decentralization. You must trust that the entity running the service is serving you (and others looking for you) accurate information. If you're not careful, you may be subject to MITM attacks.
If you remove someone from your contacts list, they will see you go offline, as if you closed your client normally. They can't communicate with you any longer until you add them to your contacts list again.
Tox makes no attempt to cloak your IP address when communicating with friends, as the whole point of a peer-to-peer network is to connect you directly to your friends. A workaround does exist in the form of tunneling your Tox connections through Tor. However, a non-friend user cannot discover your IP address using only a Tox ID; your IP address will only be discernible when you accept/send a friend request, and add a user to your contacts list.
No. That said, in some situations a client will choose to use publicly listed bootstrap nodes to find their way into the DHT.
Tox uses the cryptographic primitives present in the NaCl crypto library, via libsodium. Specifically, Tox employs curve25519 for its key exchanges, xsalsa20 for symmetric encryption, and poly1305 for MACs.
Tox does not make use of SIP.
Tox generates a temporary public/private key pair used to make connections to non-friend peers in the DHT. Onion routing is used to store and locate Tox IDs, to make it more difficult to, for example, associate Alice and Bob together by who they are looking for in the network.