ALPHA TESTING PHASE

Total
Privacy

Entropy is a high-performance desktop messenger built for those who demand absolute security. We've removed the use of PII(Personal Identifyinng Information) such as phone numbers/emails and IP addresses and avoided leakage of metadata. It's simple, native, and mathematically private.

Security_Status 100%
Identity
ANONYMOUS
Metadata
NIL
Encryption_Engine X3DH + KYBER1024
Session Activity:
Initializing secure local vault...
Vault verified. Ready for peer connection.

Privacy Shouldn't Require a Phone Number.

Most "private" messaging apps still link your identity to a phone number or email or even IP addresses. This creates a permanent anchor that can be tracked. Entropy breaks this link entirely. You are identified only by a cryptographic hash that you control.

👤

No Personal Data

No phone numbers. No emails. No "Sign in with Google". Just open the app and generate your unique identity.

⛓️

Self-Sovereign History

Your messages live on your device, not in the cloud. We use advanced hash-chaining to ensure your history remains tamper-proof.

🛡️

Future-Proof Security

Entropy uses post-quantum resistant algorithms, protecting your conversations today from the computers of tomorrow.

🌐

Blinded Origin

Our relays hash your IP address with a rotating salt, rendering your network footprint unidentifiable and ensuring all peer connections are fully blinded.

GUIDE

How to Use Entropy

Four simple steps to total communication freedom.

STEP 01

Generate Identity

When you first launch Entropy, it creates a secure local vault. This generates your unique ID—a string of characters that represents you without revealing anything about you.

STEP 02

Add your Contacts

Share your ID with friends via any secure channel. For ease of use, you can also create a custom nickname to share instead of the complex hex ID. Once they add you, you establish a direct, encrypted handshake.

STEP 03

Chat with Confidence

Every interaction is secured by Signal-grade end-to-end encryption and cryptographic history chaining. Beyond content security, Entropy masks your metadata—padding every packet and normalizing traffic—so that your activity patterns remain invisible to everyone.

STEP 04

Total Control

At any time, you can wipe your entire vault. Because we don't store your data on our servers, once you delete it locally, it's gone from the universe forever.

CAPABILITIES

Engineered for Security.

Behind the simple interface lies a powerhouse of cryptographic protection.

Anti-Surveillance Suite

Entropy moves beyond encryption, implementing active countermeasures against advanced network analysis and physical device compromise.

  • PQXDH Handshake: Post-quantum Kyber1024 combined with classical X25519.
  • Double Ratchet: Self-healing session keys rotate with every message sent or received.
  • Sealed Sender: Identity-blinding ensures the relay never knows who sent a message.
  • Continuity Lock: SHA-256 hash-chaining prevents history tampering or impersonation.
  • Sender-Key Groups: Efficient, ratcheted group messaging with 100% individual PFS.
  • Traffic Normalization: 1536-byte constant packet sizes mask all payload signatures.
  • Hardware-Bound Vault: Keyring-locked SQLCipher database bound to physical hardware.
  • PoW Anti-Spam: Dynamic Proof-of-Work prevents Sybil and network-level attacks.
  • Zero-Persistence: RAM-only, atomic delivery architecture with mandatory data purging.
// Protocol_System_Manifest
KEM PQXDH (X25519 + Kyber1024)
RATCHET Double_Ratchet + Sender_Key
VAULT Hardware_Bound_SQLCipher_v4
ROUTING Sealed_Sender (Blinded)
DYNAMICS 1536B_Pad / PoW_AntiSpam
RELAY RAM-Only_C++23_ZeroPersist
GET FIRST ACCESS

Get Early Access

Entropy is currently in active development/testing.

DEMO

See it in Action

Enter a message to see how Entropy transforms it before it leaves your device.