Privacy redefined
The first messenger
without user IDs
Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc.
SimpleX does not, not even random numbers.
This radically improves your privacy.
Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc.
SimpleX does not, not even random numbers.
This radically improves your privacy.
Preserving the privacy of your metadata — who you talk with — protects you from:
Advertising and price discrimination
Privacy saves you moneyManipulation of elections
Privacy gives you powerProsecution due to innocent association
Privacy protects your freedomMake sure your messenger can't access your data!
E2E-encrypted messages with markdown and editing
E2E-encrypted
images and files
Decentralized secret groups —
only users know they exist
E2E-encrypted voice messages
Disappearing messages
E2E-encrypted
audio and video calls
Portable encrypted database — move your profile to another device
Incognito mode —
unique to SimpleX Chat
Simplex Chat provides the best privacy by combining the advantages of P2P and federated networks.
All messages are sent via the servers, both providing better metadata privacy and reliable asynchronous message delivery, while avoiding many problems of P2P networks.
SimpleX relay servers do NOT store user profiles, contacts and delivered messages, do NOT connect to each other, and there is NO servers directory.
servers provide unidirectional queues to connect the users, but they have no visibility of the network connection graph — only the users do.
|
Signal, big platforms | XMPP, Matrix | P2P protocols | |
---|---|---|---|---|
Requires global identity | No - private | Yes 1 | Yes 2 | Yes 3 |
Possibility of MITM | No - secure | Yes 4 | Yes | Yes |
Dependence on DNS | No - resilient | Yes | Yes | No |
Single or Centralized network | No - decentralized | Yes | No - federated 5 | Yes 6 |
Central component or other network-wide attack | No - resilient | Yes | Yes 2 | Yes 7 |
We invite you to join the conversation
Sign up to receive our updates
Get SimpleX
The credential that allows proving something, e.g. the right to access some resource, without identifying the user. This credential can either be generated by a trusted party or by the user themselves and provided together with the request to create the resource. The first approach creates some centralized dependency in most cases. The second approach does not require any trust - this is used in SimpleX network to authorize access to the messaging queues.
Also known as break-in recovery, it is the quality of the end-to-end encryption scheme allowing to recover security against a passive attacker who observes encrypted messages after compromising one (or both) of the parties. Also known as recovery from compromise or break-in recovery. Double-ratchet algorithm has this quality.
Centralized networks are provided or controlled by a single entity. The examples are Threema, Signal, WhatsApp and Telegram. The advantage of that design is that the provider can innovate faster, and has a centralized approach to security. But the disadvantage is that the provider can change or discontinue the service, and leak, sell or disclose in some other way all users' data, including who they are connected with.
Also known as content padding, it is the process of adding data to the beginning or the end of a message prior to encryption. Padding conceals the actual message size from any eavesdroppers. SimpleX has several encryption layers, and prior to each encryption the content is padded to a fixed size.
A communication system where only the communicating parties can read the messages. It is designed to protect message content from any potential eavesdroppers – telecom and Internet providers, malicious actors, and also the provider of the communication service.
Also known as perfect forward secrecy, it is a feature of a key agreement protocol that ensures that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. Forward secrecy protects past sessions against future compromises of session or long-term keys.
Also known as key exchange, it is a process of agreeing cryptographic keys between the sender and the recipient(s) of the message. It is required for end-to-end encryption to work.
Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Tor, for example, is an overlay network on top of IP network, which in its turn is also an overlay network over some underlying physical network.