Features
Comprehensive security and privacy features designed for the modern age
Core Security Features
P2P Encrypted Messaging
Direct peer-to-peer communication with end-to-end encryption using post-quantum cryptographic algorithms.
- • Kyber-1024 for key exchange
- • Dilithium-5 for signatures
- • AES-256-GCM for message encryption
Tor-Native Connection
Built-in Tor integration provides anonymous routing and IP address protection by default.
- • Automatic Tor circuit creation
- • Hidden service support
- • No IP address exposure
Zero Metadata Storage
Absolutely no metadata is stored on servers. Complete privacy by architectural design.
- • No message timestamps
- • No contact lists on server
- • No IP logs
Proof-of-Work Anti-Abuse
GPU-resistant proof-of-work system prevents spam and abuse without compromising user privacy.
- • Argon2id-based PoW
- • Adaptive difficulty
- • No user tracking required
Encrypted Safe
Secure local storage for sensitive files with military-grade encryption.
- • AES-256 encryption
- • Local-only storage
- • Password-protected access
Anonymous Identity
No phone number, email, or personal information required. True anonymous communication.
- • Cryptographic identity only
- • No registration required
- • Self-sovereign identity
Advanced Protection
P2P Transactions
Secure peer-to-peer cryptocurrency transactions with built-in wallet integration.
- • Multi-currency support
- • Hardware wallet compatibility
- • Atomic swaps
Hidden Mode
Stealth mode that hides the app from device lists and recent applications.
- • Disguised app icon
- • Panic button for instant hide
- • Decoy mode
Device Integrity Check
Continuous monitoring for rooted devices, debuggers, and tampering attempts.
- • Root/jailbreak detection
- • Anti-debugging protection
- • Code integrity verification
Trust Score System
Behavioral analysis to identify and rate contact trustworthiness without central authority.
- • Local spam detection
- • Behavioral pattern analysis
- • Community-based reputation
Cryptographic Foundation
Post-Quantum Algorithms
- Kyber-1024 (KEM)
- Dilithium-5 (Signatures)
- SPHINCS+ (Backup)
Symmetric Encryption
- AES-256-GCM
- ChaCha20-Poly1305
- XSalsa20
Key Derivation
- Argon2id
- HKDF-SHA512
- PBKDF2-SHA256