CRYPTOGRAPHIC FOUNDATIONS

🔑 E2E Encryption

Messages encrypted on-device, sent encrypted through servers, decrypted only on recipient's device. We never hold your keys.

🚫 Zero-Knowledge

Mathematically impossible for us to access your data. No backdoors, no master keys, no exceptions. Ever.

🌐 Perfect Forward Secrecy

Unique temporary keys per session. Compromised key = only that session at risk, not past or future.

📡 Decentralized

No single point of failure. Multi-node routing ensures uninterrupted communication even during outages.

🔍 Zero Metadata

No IP logs, timestamps, participant lists, or patterns tracked. Metadata protection equals content protection.

🎯 Deniable Auth

Mathematically impossible to prove message origin. Protects dissidents, journalists, and at-risk individuals.

NETWORK ARCHITECTURE

🎨 Client Layer

iOS, Android, Web, Desktop apps. All encryption/decryption on-device. UI handling and local storage only.

🌉 API Gateway

Stateless relay servers routing encrypted messages. See only encrypted blobs. No ability to decrypt, inspect, or understand content.

💾 Data Storage

AES-256-GCM encryption at rest. Each user's data encrypted with their key. Servers only store encrypted blobs.

🔐 Key Management

Keys generated locally, never sent to servers. PBKDF2 key derivation. Encrypted backups only.

EXPLORE NETWORK

Platforms Specs About