CRYPTOGRAPHIC FOUNDATIONS
🔑 E2E Encryption
Messages encrypted on-device, sent encrypted through servers, decrypted only on recipient's device. We never hold your keys.
🚫 Zero-Knowledge
Mathematically impossible for us to access your data. No backdoors, no master keys, no exceptions. Ever.
🌐 Perfect Forward Secrecy
Unique temporary keys per session. Compromised key = only that session at risk, not past or future.
📡 Decentralized
No single point of failure. Multi-node routing ensures uninterrupted communication even during outages.
🔍 Zero Metadata
No IP logs, timestamps, participant lists, or patterns tracked. Metadata protection equals content protection.
🎯 Deniable Auth
Mathematically impossible to prove message origin. Protects dissidents, journalists, and at-risk individuals.
NETWORK ARCHITECTURE
🎨 Client Layer
iOS, Android, Web, Desktop apps. All encryption/decryption on-device. UI handling and local storage only.
🌉 API Gateway
Stateless relay servers routing encrypted messages. See only encrypted blobs. No ability to decrypt, inspect, or understand content.
💾 Data Storage
AES-256-GCM encryption at rest. Each user's data encrypted with their key. Servers only store encrypted blobs.
🔐 Key Management
Keys generated locally, never sent to servers. PBKDF2 key derivation. Encrypted backups only.