Shopping Cart

No products in the cart.

Go to top
About Us

It generally does not you will need to replace common chatting software, but instead to add another, safe route getting confidential discussions

It generally does not you will need to replace common chatting software, but instead to add another, safe route getting confidential discussions

Lined up proper who wants to ensure the conversations was leftover personal and you may likes more protection more than appreciate has actually.


All of our purpose was to perform an anonymous chat platform which can be taken safely over checked infrastructures to make certain that discussions cannot be recovered even when the servers has been captured otherwise certainly one of the participants has been requested.

I’ve composed a different sort of provider hence doesn’t need people kind of research stores and you can makes sure that messages can not be decrypted even with the entire expertise in this new server contents, network travelers, and you will considering miracle passwords.


Real-big date messaging – Every piece of data is actually exchanged immediately amongst the activities; there’s nothing queued otherwise kept, for even an individual 2nd.

How it functions

The client app set an effective WebSocket (more TLS) contact with the new chat server. They carry out a supplementary encrypted covering, playing with ECDH to own key exchange and AES-256 for ciphering. Throughout the secret change, texts regarding server are RSA-closed and you will verified because of the consumer to be sure it’s maybe not connecting so you can good forged interest. Which 2nd coating along with prevents transparent proxies (employing own California licenses installed on the consumer) regarding examining its correspondence.

Once the server union is actually secured, it joins new offered route and you can begins building up prevent-to-stop encrypted levels with every personal user (having fun with ECDH to possess key change and you can ChaCha20-Poly1305 having ciphering). Shared ECDH secrets is combined with provided route passwords, which results in book and one-date encoding tips within people. These types of tactics can not be rebuilt even after the information and knowledge of one’s second layers decrypted circle website visitors in addition to secret passwords. As well, this procedure implies that users entering the same channel with a different password cannot correspond with each other.

It’s worthy of bringing-up that the channel password never ever will leave this new buyer, brand new login name is only sent over the 3rd layer among the participants lonely chat rooms, together with channel name’s gotten by the host inside the an SHA-256 hashed form from the second level.

Supply code

We possibly may supply the supply password of your own server and buyer app in the event the considering a well-built request (elizabeth.g. informative explore, protection audit).


We are purchased protecting and valuing your privacy. It privacy policy means and you will controls our very own guidance collection, have fun with, and discussing techniques. Before you could fill out/publish one information or document to our other sites, please meticulously opinion it policy.

Research operator

For the purpose of studies defense statutes appropriate for you for the the region from which you provide your details, our company is the brand new “studies control” of your recommendations your provide to our other sites. There is certainly almost every other controllers too (age.g.: advertisers), and in addition we prompt that request their confidentiality regulations to understand a little more about their confidentiality techniques.

Investigation storage and utilize aim

Please be aware that this privacy can be applied merely to suggestions gathered owing to the websites rather than to your pointers you can bring to any 3rd-class internet that we might connect.

We make use of websites server record documents. Every piece of information into the these types of journal records includes Ip address, date/date stamp, referring/exit page, and kind regarding web browser. We utilize this advice only to manage all of our websites.

We play with third-class ad machine properties Bing Adsense, PubMax Ads and you can Publift Fuse; internet statistics services Yahoo Statistics, and you can a permission government system from Quantcast.

I and you may our very own 3rd-cluster providers (in depth above) can also shop and gather analysis related to the entry to the websites for the next aim. Take note that of the rejecting one otherwise them, you will possibly not gain access to particular keeps or products out-of the other sites.

Play with direct geolocation studies. Your precise geolocation data can be used in support of one or more purposes. “Precise” means your location can be accurate to within several meters.

Earnestly check tool services for identification. Your device can be identified based on a scan of your device’s unique combination of characteristics.

Discover first ads. Ads can be shown to you based on the content you’re viewing, the app you’re using, your approximate location, or your device type.

Create a good customised adverts reputation. A profile can be built about you and your interests to show you personalised ads that are relevant to you.

Manage a personalised content profile. A profile can be built about you and your interests to show you personalised content that is relevant to you.

Implement market research generate audience expertise. Market research can be used to learn more about the audiences who visit particular sites/apps and view ads.

Create and you will improve things. Your data can be used to improve existing systems or software and to develop new products.

Store and you will/otherwise accessibility details about an instrument. Cookies, device identifiers, or other information can be stored or accessed on your device for the above purposes presented to you.

Research retention

Our very own Bing Statistics tracking password was configured to save studies you to are for the cookies, representative identifiers, otherwise adverts identifiers for fourteen months.