Why Choose Us?
What makes us different to the competition? Why are we so much better than the rest?
We Can Not Read Your Messages
Unlike our competitors, Facebook and WhatsApp, we can not and do not read your messages or shared content. Everything you send our networks is encrypted, end to end. By doing this we can ensure the security and integrity of your messages and shared content.
We Do Not Sell Your Data
Unlike our competitors, Facebook and WhatsApp, we do not sell your data. Your messages, shared content and metadata are components of your personal life data and we do not believe in making profit from that. It's lazy and not something we're going to do, ever.
Unlike our competitor, Signal, you can access your profile from mulitple devices securely and privately. Our system is secured against MiTM and Memory Buffer Overflow attacks and hacks, unlike WhatsApp and Facebook.
Open Source SDK
We hate and despite ads with a burning passion. Our competitors, Facebook and WhatsApp sell data generated by users using their platforms to ads networks and publishers. In our opinion it is a lazy business model and it's not something we're going to imitate. That is why we are free of ads and retartgetting.
Free for Life
We are now and always will be free for consumers. Free to use. Free of ads. Free of spyware. Free of retargetting.
Security Comparison Chart
|Does the app secure my messages and attachments?||Y||N||N||Y||N||N||N||N||Y||Y||N|
|Implicated in giving cutomer's data to intelligence agencies?||N||Y||Y||N||N||N||N||Y||N||N||N|
|Surveillance capability built into the app?||N||Y||Y||N||N||N||N||Y||N||N||N|
|Does the company provide a transparency report?||Y||N||Y||Y||Y||N||N||Y||Y||Y||N|
|Company's stance on customers privacy||GOOD||POOR||POOR||GOOD||GOOD||POOR||POOR||POOR||GOOD||GOOD||GOOD|
|Funding||KRYOTECH||SIGNAL FOUNDATION||GILMAN LOUIE/JUNIPER NETWORKS||PAVEL DUROV||RAKUTEN/TALMON MARCO||MICROSOFT||JANUS FRIIS/ICONICAL/ ZETA||USER PAYS||NEW VECTOR LTD.|
|Company collects customer's data?||N||Y||Y||Y||N||Y||Y||Y||Y||N||Y|
|Is encryption turned on by default?||Y||N||Y||Y||Y||N||Y||Y||Y||Y||N|
|Cryptographic primitives||ED25519 / Curve25519 / HMAC-SHA2-224/256/384/512 / ROUND5 / FALCON||Curve25519 / AES-256 / HMAC-SHA256||Curve25519 / AES-256 / HMAC-SHA256||Curve25519 / AES-256 / HMAC-SHA256||ECDH512 / AES-256 / HMAC-SHA256||RSA 2048 / AES 256 / SHA-256||Curve25519 256 / Salsa20 128 / HMAC-SHA256||RSA-1536 & 2048 / AES 256 / SHA-1||Curve25519 / ChaCha20 / HMAC-SHA256||Curve25519 256 / XSalsa20 256 / Poly1305-AES 128||Curve25519 / AES-256 / HMAC-SHA256|
|Are the app and server completely open source?||N||N||N||N||Y||N||Y||N||N||Y||Y|
|Can you sign up to the app anonymously?||N||N||N||N||Y||N||N||N||N||Y||Y|
|Can you add a contact without needing to trust a directory server?||N||Y||Y||N||Y||N||Y||N||Y||Y||Y|
|Can you manually verify contacts' fingerprints?||N||Y||Y||Y||Y||N||Y||N||Y||Y||Y|
|Directory service could be modified to enable an MiTM attack?||N||Y||Y||Y||Y||Y||Y||Y||Y||Y||Y|
|Do you get notified if a contact's fingerprint changes?||Y||N||N||Y||N||N||Y||N||N||Y||Y|
|Is personal information (mobile, number, contact list, etc) hashed?||N||N||N||N||Y||N||N||N||Y||Y||N|
|Does the app generate and keep a private key on the device itself?||Y||Y||Y||Y||Y||Y||Y||N||Y||Y||Y|
|Can messages be read by the company?||N||Y||N||N||N||Y||N||Y||N||N||N|
|Does the app enforce perfect forward secrecy?||Y||Y||Y||Y||Y||N||Y||N||Y||N||Y|
|Does the app encrypt metadata?||Y||N||N||Y||Y||N||N||N||N||Y||N|
|Does the app use TLS/Noise to encrypt network traffic?||Y||Y||Y||Y||Y||N||Y||Y||Y||Y||Y|
|Does the app use certificate pinning?||Y||Y||Y|
|Does the app encrypt data on the device?||Y||N||N||Y||Y||N||N||Y||Y||Y||N|
|Does the app allow a secondary factor of authentication?||N||N||Y||N||Y||Y||N||N||Y||Y||N|
|Are messages encrypted when backed up to the cloud?||Y||Y|
|Does the company log timestamps/IP addresses?||N||Y||Y||N||N||Y||Y||Y||N||N||Y|
|Have there been a recent code audit and an independent security analysis?||N||N||N||Y||Y||Y||N||N||Y||Y||N|
|Is the design well documented?||Y||N||N||N||N||N||N||N||N||N||N|
|Does the app have self-destructing messages?||N||Y||N||Y||Y||Y||N||N||Y||N||N|