Welcome to ChatCrypt.An end-to-end encrypted group talk that does not keep such a thing when you look at the cloud.

Welcome to ChatCrypt.An end-to-end encrypted group talk that does not keep such a thing when you look at the cloud.

No databases, no reports, no talk logs.

Aimed for anybody who would like to make sure that their conversations are held personal and prefers more protection over fancy features. It will not you will need to replace popular texting applications, but rather to produce an alternative, safe channel for private conversations.


Our objective would be to produce an anonymous talk platform and that can be utilized safely over examined infrastructures in order that conversations can not be restored even though the host happens to be seized or among the participants happens to be questioned.

We now have developed a solution that is unique will not need any kind of information storage space and makes certain that communications can't be decrypted despite having the entire familiarity with the host articles, community traffic, and offered key passwords.


Triple encryption – Two extra safety levels protect communications, along with the standard TLS protocol.

Outstanding privacy – Conversations can occur without supplying any detail that is personal account.

Real-time messaging – Each piece of information is exchanged instantly amongst the ongoing events; absolutely absolutely nothing is queued or kept, even for just one 2nd.

How it functions

The customer application establishes a WebSocket (over TLS) experience of the talk host. Chances are they create yet another encrypted layer, making use of ECDH for key trade and AES-256 for ciphering. During key change, communications through the host are RSA-signed and confirmed by your client to be sure it isn't linking up to a destination that is forged. This layer that is second prevents transparent proxies (along with their very own CA certificates installed from the customer) from inspecting their interaction.

After the host connection is guaranteed, it joins the given channel and starts gathering end-to-end encrypted levels with every member that is individual ECDH for key trade and ChaCha20-Poly1305 for ciphering). Shared ECDH keys are combined with supplied channel passwords, which leads to unique and encryption that is one-time between your events. These tips is not reconstructed despite having the data of this second levels decrypted system traffic while the key passwords. Furthermore, this method means that people going into the channel that is same a different password cannot communicate with one another.

It really is well worth mentioning that the channel password never ever makes your client, the username is just transmitted within the 3rd layer one of the people, while the channel title is received because of the host in a SHA-256 hashed form through the layer that is second.

Source rule

We might offer the supply rule associated with server and client application if offered a well-founded demand (e.g. academic usage, safety audit).

Online privacy policy

We have been dedicated to protecting and respecting your privacy. This online privacy policy describes and governs our information collection, usage, and practices that are sharing. Before you submit/upload any information or file to your internet sites, please carefully review this policy.

Information controller

For the true purpose of information security laws and regulations applicable for you within the location from where you offer your information, our company is the controller that is"data of this information you provide to your web sites. There might be other controllers also (e.g.: advertisers), and you are encouraged by us to consult their privacy policies for more information on their privacy methods.

Our data that are primary's contact:

Data storage space and use purposes

Take note that this online privacy policy is applicable simply to information gathered through our websites and never to your information you may possibly offer to your third-party sites to which we might connect.

We utilize web host log files. The information and knowledge inside these log files includes internet protocol address, date/time stamp, referring/exit web page, and style of web browser. We utilize this information entirely to manage our web sites.

We use third-party ad server solutions Bing Adsense, PubMax Ads and Publift Fuse; web analytics solution Bing Analytics, and a permission management platform from Quantcast.

We and our third-party providers (detail by detail above) could also keep and gather data linked to your utilization of our sites for listed here purposes. Take note that by rejecting any or each of them, may very well not get access to features that are certain offerings of our internet sites.

Utilize precise geolocation data. Your precise geolocation information can be utilized to get more than one purposes. "Precise" means your local area may be accurate to within several meters.

Actively scan unit faculties for identification. Your unit could be identified predicated on a scan of the unit's unique mix of faculties.

Select fundamental ads. Advertisements may be proven to you on the basis of the content you are viewing, the application you are utilizing, your approximate location, or your unit kind.

Develop a personalised ads profile. A profile may be built you personalised ads that are relevant to you about you and your interests to show.

Select personalised ads. Personalised advertisements may be demonstrated to you centered on a profile about yourself.

Produce a personalised content profile. A profile could be built in regards to you along with your interests to show you personalised content this is certainly highly relevant to you.

Select personalised content. Personalised content may be proven to you centered on a profile about yourself.

Measure advertisement performance. The performance and effectiveness of adverts which you see or connect to may be measured.

Measure content performance. The performance and effectiveness of content which you see or connect to can be calculated.

Apply market research to create market insights. Marketing research could be used to find out about the audiences whom see specific sites/apps and view ads.

Develop and enhance services and products. Important computer data could be used to improve current systems or pc software and also to develop products that are new.

Shop and/or access information about a device. Cookies, unit identifiers, or other information could be saved or accessed on the device for the above purposes presented to you personally.

Information retention

Our internet server log files are deleted after ninety days.

Our Bing Analytics tracking code is configured to store information this is certainly connected with snacks, user identifiers, or advertising identifiers for as much as 14 months.

In the event that you need more info or have questions regarding our online privacy policy, please go ahead and call us.

Terms of good use

Be advised that ChatCrypt is an interest project and provided completely "as it is," without guarantee of any sort.

Nevertheless, there has been no complaints thus far.

Call us

Please go ahead and call us with any relevant concerns or recommendations.

כתיבת תגובה

האימייל לא יוצג באתר. שדות החובה מסומנים *