Technical Documentation

Cipher Messaging Documentation

A secure, serverless, and decentralized messaging platform designed to provide maximum privacy and security. No metadata. No compromise.

Overview

Cipher Messaging is a secure, serverless, and decentralized messaging platform designed to provide maximum privacy and security for its users. Unlike traditional messaging apps, Cipher Messaging eliminates metadata entirely, ensuring that no one knows who you communicate with, when, or where you are located.

All messages are encrypted, and no server stores any data or communication logs. Cipher Messaging is built to protect your identity, communication patterns, and social network from surveillance.

Zero Metadata

End-to-End Encrypted

Serverless Architecture

Core Philosophy and Purpose

Cipher Messaging is focused on providing a private and secure communication experience. The app's core value proposition is to protect user privacy by ensuring zero metadata exposure.

Who You Talk To

No one knows who you communicate with

When You Communicate

No timestamps or patterns are recorded

Where You Are

Your location is never exposed

Designed for Those Who Need Absolute Privacy

Journalists

Protecting their sources

Activists

Organizing without revealing their networks

Whistleblowers

Maintaining anonymity

Legal Professionals

Ensuring confidential communications

Key Features

Explore the comprehensive security features that make Cipher Messaging the most private messaging platform available.

What it is

Cipher Messaging ensures no metadata is stored, recorded, or transmitted. This means no server knows who you talk to, when you talk, or where you are located. Metadata such as IP addresses, timestamps, and social graphs are eliminated entirely.

Why it matters

This is critical for users who want to avoid being surveilled or profiled based on their communication patterns.

What it is

All messages are encrypted on the sender's device and decrypted only on the recipient's device. This ensures that no one can read your messages, not even Cipher Messaging or any third party.

Why it matters

This guarantees privacy by ensuring that only the intended recipient can read your messages.

What it is

Users can compose messages offline, and the app stores them securely on the sender's device. These messages are transmitted only when the recipient's device is available.

Why it matters

This feature improves the user experience by allowing users to send messages even when they are not connected to the internet.

What it is

Cipher Messaging allows users to choose between ultra-secure encryption for highly sensitive conversations or performance-optimized encryption for less sensitive conversations.

Why it matters

This provides flexibility for different types of communication, ensuring that the app can cater to both casual and high-security needs.

What it is

The app uses machine learning algorithms on the user's device to detect abnormal patterns or unauthorized access attempts, providing real-time alerts for potential security breaches.

Why it matters

Adds an extra layer of protection, proactively preventing threats before they can affect the user's device or data.

What it is

Users can enable biometric authentication (e.g., fingerprint or facial recognition) in addition to a PIN for accessing the app and sending/receiving messages.

Why it matters

This enhances security while maintaining ease of use, ensuring that only the rightful user can access their messages.

What it is

Cipher Messaging enables fully decentralized group chats, meaning no third-party server stores group conversations. Messages in group chats are only delivered when all members are online and authenticated.

Why it matters

This prevents unauthorized access to group communications, ensuring privacy and security.

What it is

A unique messaging protocol where messages are only sent once both the sender and recipient are online and have authenticated each other. The process involves "wake" requests, ensuring that the message isn't stored or transmitted until the recipient is ready.

Why it matters

It prevents messages from being sent to offline or compromised devices, ensuring that only active, authenticated communication happens.

What it is

If a user feels they are under threat, they can enter a Panic PIN that triggers immediate wiping of the user's messages and keys, notification to contacts to delete any queued messages, and app reset to prevent further access.

Why it matters

Adds a critical layer of security in high-risk situations, preventing attackers from gaining access to private communications.

What it is

Users can set message expiration parameters. Messages can delete after a certain number of reads, auto-delete after a set time, or when forwarded a specific number of times.

Why it matters

This gives users complete control over the lifespan of their messages, ensuring that sensitive data is removed from the system automatically.

What it is

User identities are stored on the blockchain (specifically Solana) and are cryptographically hashed for anonymity.

Why it matters

This ensures self-sovereign identity: users own and control their identity without relying on third-party services or servers that could be compromised.

What it is

Cipher Messaging allows users to send encrypted voice messages directly between devices over a peer-to-peer connection (up to ~3 minutes of audio).

Why it matters

Voice messages are never stored on servers, reducing the risk of surveillance or compromise.

What it is

Cipher Messaging intentionally does not support file attachments, images, videos, or arbitrary documents to minimize security risks like malware or phishing.

Why it matters

By limiting functionality, Cipher Messaging keeps the attack surface small and the system secure.

Security and Privacy

Learn how Cipher Messaging achieves its industry-leading security and privacy standards.

Zero Trust Architecture

Cipher Messaging is designed with a zero-trust approach, meaning no component (client, relay, or developer) is inherently trusted.

All communication is encrypted end-to-end, and metadata is never stored, ensuring that no entity, even Cipher Messaging, can access your data.

Device-Level Security

Private keys are stored in secure hardware-backed storage such as Android StrongBox or iOS Secure Enclave.

These secure storage mechanisms prevent private keys from being extracted or accessed by unauthorized parties, even if the device is compromised.

Forward Secrecy

Forward secrecy ensures that even if a user's device is compromised in the future, past messages cannot be decrypted.

The app uses ephemeral key exchange methods to ensure that session keys are not reused, providing robust security even after key compromise.

Tor Network for Anonymity

All traffic is routed through the Tor network for enhanced anonymity.

By using Tor, Cipher Messaging ensures that no one can trace the user's location or identity based on network traffic.

Tokenomics

Bonus Feature

To help fund Cipher Messaging, we are introducing a tax token. This token is a bonus feature and not the main focus of Cipher Messaging, but it helps fund the platform's growth and sustainability.

7%

Transfer Tax

Applied to both buy and sell transactions

Tax Revenue Allocation

Holders50%

Token holders receive a portion of the tax revenue as a reward

Marketing25%

Funds used to drive awareness and promote Cipher Messaging

Team15%

Compensation for the development team and core contributors

Development10%

Ongoing development and infrastructure costs

How to Use Cipher Messaging

Get started with Cipher Messaging in just a few simple steps.

Step 1

Download and Install

Cipher Messaging is available on both Android and iOS. Download the app from the App Store or Google Play, or download the APK directly from our website.

Step 2

Set Up Your Identity

Create a blockchain-based identity using your wallet address. No personal information is required. Your identity is cryptographically secured and stored on the Solana blockchain.

Step 3

Start Messaging

Compose messages using end-to-end encryption. Messages will be securely stored on your device and delivered once the recipient's device is authenticated through the Ping-Pong protocol.

Step 4

Use the Panic Button (If Needed)

In case of emergency, use the Panic PIN to instantly wipe all keys and messages from your device and notify your contacts to delete any queued messages.