Ephemeral Encryption - Every Session
Each call or message session generates new cryptographic keys using Elliptic Curve Diffie-Hellman (ECDH). Keys are never reused, stored, or recoverable.
Public keys are discovered through a decentralized blockchain contract - not phone numbers, email addresses, or contact lists. Your identity is cryptographic, not personal.
No Cloud Backups. No Syncing. No Mirrors.
Your communications exist only on your device and the peer you are connected to - nowhere else.
Security vs Convenience - A Conscious Choice
Prioritizing maximum security and privacy means accepting certain trade-offs:
No password recovery
No account restoration if a device is lost
No centralized contact discovery
No “trust us” infrastructure
This app is for users who prefer cryptographic certainty over convenience.
Who is this for?
Privacy-focused individuals
Journalists, executives, and activists
People operating in high-risk environments
Anyone who believes private communication should actually be private