End-to-End Encryption

Private means private — not “private until subpoena,” not “private until policy update.”

How It Works

Messages are encrypted on your device before they are transmitted. Only verified devices inside the conversation can decrypt them.

Encryption flow diagram

Recovery Key

When you register, you receive a recovery key. This unlocks encrypted history when logging in on new devices.

We do not store this key. If lost, encrypted history cannot be restored.

Device Verification

When adding a new device, you may verify it using a secure emoji or key comparison. This ensures no unauthorized device is reading your encrypted data.