× Home About Us Services Blog Contact

A genuine end-to-end encrypted group talk which will not keep any such thing into the cloud

  • November 8, 2020
  • Comments (0)

A genuine end-to-end encrypted group talk which will not keep any such thing into the cloud

Aimed if you wish to be certain that their conversations kept private and prefers increased safety over fancy features. It will not attempt to replace popular texting applications, but to give an alternative safe channel for private conversations.


Our objective would be to produce an anonymous talk platform that can be properly used over inspected infrastructures and conversations may not be restored just because the host will be seized or somebody got interrogated.

We've were left with a solution that is unique doesn't need any type of data storage space and assures that communications can not be decrypted despite having the whole familiarity with the host articles, community traffic, and supplied key passwords.


Triple encryption - communications are protected by two security that is additional on the surface of the standard TLS protocol.

Outstanding privacy - Conversations happen without supplying any detail that is personal account.

Real-time messaging - Every information exchanged straight away between your ongoing parties, absolutely nothing is queued or saved also for just one 2nd.

How it operates

The customer application establishes a WebSocket (over TLS) experience of the talk host chances are they create an extra encrypted layer ECDH that is using for change and AES-256 for ciphering. During key change communications through the server are RSA finalized being confirmed by the customer to ensure it is really not linking up to a destination that is forged. This layer that is second stops clear proxies (with very very own CA certificates installed regarding the customer) from inspecting their interaction.

When the host connection is secured it joins the offered channel and begins gathering end-to-end encrypted levels with every specific user utilizing ECDH for key change and ChaCha20-Poly1305 for ciphering. Shared ECDH keys are with the supplied channel passwords which leads to unique and one-time encryption tips amongst the events. These secrets may not be reconstructed despite having the information of this second levels decrypted system traffic plus the key passwords. Furthermore, this method means that people going into the exact same channel with a different password cannot communicate with one another.

Well well well Worth mentioning that the channel password never ever makes the customer, the username is transmitted on the 3rd layer among the list of users, together with channel name is gotten because of the host in a SHA-256 hashed form through the layer that is second.

Supply rule

We possibly may offer the supply rule associated with host and customer application upon a ragequest that is well-foundede.g. educational usage, protection review).

Online privacy policy

The privacy of y our visitors is of extreme importance to us. This part describes the kinds of private information is collected and received by this site and exactly how it really is utilized.

This amazing site makes utilization of internet host log files. The knowledge in the log files includes internet protocol (internet protocol address) details, types of web web browser, online sites company (ISP), date/time stamp, referring/exit pages, and wide range of ticks to assess trends, administer your website, track user's movement across the web web site, and gather information that is demographic. internet protocol address details, as well as other such information are perhaps perhaps maybe not associated with any information that is physically recognizable.

We additionally utilize snacks supplied by trusted parties that are third. This web site utilizes Bing Analytics which will be probably the most trusted and widespread analytics solution on line for assisting us to comprehend the method that you utilize the web web site and means that people can enhance your experience. These cookies may monitor things such as for example the length of time you may spend https://hookupdates.net/xmeeting-review/ on the webpage therefore the pages which you visit therefore we can continue steadily to create engaging content.

Information retention

Internet host log files are deleted after ninety days.

Bing Analytics with this internet site is placed to keep information this is certainly related to cookies, individual identifiers, or marketing identifiers for approximately 14 months (currently the cheapest choice).

In the event that you need any longer information or have relevant questions regarding our online privacy policy, please go ahead and call us.

Terms of good use

Be advised that ChatCrypt is a spare time activity task and supplied " as it is", without guarantee of any sort.

Nevertheless, there have been no complaints to date.

E mail us

Please take a moment to e mail us with any questions or recommendations.

Leave a Reply

Your email address will not be published. Required fields are marked *