Private messaging built for security and anonymity. No account, phone number, or email required - your identity is protected by cryptography, not trust.
End‑to‑end encrypted (post‑quantum design)
Messages are encrypted on your device before they ever hit the network:
- Kyber‑1024 for key exchange
- AES‑256‑GCM for message encryption
- Dilithium‑5 signatures for authenticity
- Zero‑trust routing
Messages relay through a decentralized network of zero‑trust nodes designed to run in memory with no persistent storage and no server logs by design. Relay nodes can’t read message content.
Ephemeral delivery
Undelivered messages are kept on the network for up to 2 hours, then deleted. They’re also deleted as soon as the recipient retrieves them.
Harder to trace over time
Session identifiers rotate periodically to limit long‑term tracking.
How to Connect
Device A - Create a Session:
- Tap [+] on main screen (Add Session)
- Choose Create, then press Create Session
- Show QR Code - displays a scannable code (shown by default), or
- Share/Copy Link - generates a unique invitation link to share
- Tap Back to return to main screen and wait for Device B to join
Device B - Join the Session:
- Tap [+] on main screen (Add Session)
- Choose Scan then either:
- Open Scanner - scan the QR code from Device A, or
- Paste Link - paste the invitation link from Device A
- If link is valid, the app will start the key exchange
Wait for Key Exchange:
- Both devices will automatically perform a secure key exchange, keep the app on screen and wait for it to complete
- This may take some time depending on network conditions
- Once the session shows as "Secure", you can send and receive encrypted messages between the two devices.
Features
- No login or personal data required
- Post‑quantum end‑to‑end encryption for messages
- Decentralized, zero‑trust routing
- Memory‑only nodes (no persistent storage)
- Automatic message expiration on server (max 2 hours)
- Rotating identifiers to reduce tracking
- Offline message delivery
- App lock with device biometrics/passcode (where supported)
True Privacy
We cannot read your messages. We do not know who you are or who you communicate with. Even under legal compulsion, there is nothing to hand over - no logs exist, no messages are stored, and all data is encrypted with keys only you and your contact possess.
Your conversations belong to you alone.
Date de mise à jour
25 msi 2026