ZERO-KNOWLEDGE ARCHITECTURE

Own the silence.

Encrypted messaging that leaves nothing behind.

Messages exist only in transit. No servers store them. No cloud backs them up.
No archive survives to be seized, subpoenaed, or sold.
Ephemeral by design.

Scroll

They built bigger locks.
We eliminated the room.

Encryption

End-to-end. Client-side.
Keys never leave your device

Every message is encrypted before it touches any relay. The relay never sees a conversation.
That is not a feature, that is the default.

X25519 → HKDF-SHA256 → Pad → ChaCha20-Poly1305 → Base64 → Nostr Event → Schnorr Sign → Relay
Key agreement → Key derivation → Traffic normalization → Authenticated encryption → Transport encoding → Event wrapping → Identity binding → Delivery

X25519 Key Exchange

Each user generates an X25519 keypair on first launch. Shared secrets are derived via Diffie-Hellman and fed into HKDF-SHA256 with a room-scoped salt, producing unique per-peer symmetric keys.

ChaCha20-Poly1305

All message content is encrypted with ChaCha20-Poly1305 AEAD, providing both confidentiality and integrity. Each message uses a fresh 12-byte random nonce.

Sender Key Forward Secrecy

Chain keys ratchet forward after each send (HMAC-SHA256), providing forward secrecy. Keys rotate every 100 messages or on any membership change.

Privacy Envelopes

Sensitive operations (DMs, reactions, receipts, key exchanges) are wrapped in privacy envelopes, a second encryption layer with independent HKDF derivation, hiding both content and operation type from relays.

Message Padding

Messages are padded to predefined bucket sizes (256B → 512KB) before encryption, preventing traffic analysis from inferring message length. Buckets follow a power-of-two scheme to minimize overhead.

Nostr Schnorr Identity

User identity is a secp256k1 keypair.
Events are signed with BIP-340 Schnorr signatures, providing non-repudiation and relay-verifiable authenticity.

Zero-Knowledge Architecture

Ephemeral by design.

Every other messenger creates data and builds defenses around it. Ping's primary defense is the absence of the data itself. The architecture is designed so that no entity, not the relays, not the client, ever has access to message content or user communication graphs.

  • File sharing URLs embed decryption keys in the URL fragment
  • Session authentication uses HMAC-SHA256 tokens, no client code transmitted on auth
  • Key fingerprints enable out-of-band identity verification between peers
  • Private keys encrypted at rest with PIN or biometric-derived keys
  • Device seizure yields nothing, no message database to extract zero attack surface
  • Infra compromise yields nothing, relays hold no content or history zero attack surface
  • Subpoenas yield nothing, no backup exists to compel zero attack surface
  • Key compromise yields nothing retroactively, no historical ciphertext to target zero attack surface
Session Security

Your keys. Your device.

Private keys are encrypted at rest and protected by configurable local authentication.

PIN Lock

4-digit PIN encrypts the identity at rest using PBKDF2 with 200,000 iterations + a device-bound key derived from WebCrypto. Rate-limited: 3 attempts, then 30s lockout doubling to 1 hour. Countdown displayed live.

WebAuthn Biometric

Optional fingerprint/face unlock via WebAuthn platform authenticators. Stores a PRF-derived credential that can decrypt the identity without PIN entry. Falls back gracefully if biometrics unavailable.

Identity Encryption at Rest

Private keys in localStorage are AES-GCM encrypted with a key derived from PIN + device salt + PBKDF2. Even with device access, keys require the PIN or biometric to decrypt.

Session Export / Import

Full identity + room state can be exported as an encrypted JSON blob for device migration. Import restores the complete session including cryptographic identity and room memberships.

Messaging

Full-featured. Fully encrypted.

Not a demo. A real P2P messenger, with every feature encrypted end-to-end by default.

Multi-Room Chat

Join multiple rooms with independent message streams, peer lists, and sender key states. Room switching is instant.

Encrypted DMs

Pairwise X25519 envelopes within rooms. Slide-up panel with gesture dismiss and per-peer thread persistence.

Disappearing Messages

Per-conversation timers, 30 seconds to 24 hours. Messages auto-delete from local display.

Reactions & Emoji

Tap-and-hold reactions sent as privacy-enveloped events. Full emoji picker with skin tone support.

Delivery Receipts

Privacy-enveloped confirmations routed through pairwise encryption. Checkmarks on sent messages.

Reply Threading

Tap-to-reply with quoted previews. References embedded in the encrypted payload and rendered as linked blocks.

Built-in Tools

Encrypted utilities.

Standalone zero-knowledge tools accessible directly from chat.

Manuscrypt

Client-side file encryption via zero-knowledge relay. Decryption key lives in the URL fragment, never sent to the server. Optional password. Configurable expiry.

URL Shortener

Encrypted short URLs with expiry and optional password. Destination encrypted client-side before storage. Quick-send to any room or DM.

QR Generator

Generate QR codes for any text or URL. Client-side rendering with error correction. Send directly into chat.

Platform

Everywhere you operate.

One protocol. Multiple interfaces. Same zero-knowledge guarantees across every client.

Live

Telegram Mini App

Primary client. Launch directly inside Telegram with no install. Full encryption, rooms, DMs, and tools.

Loading...

Paste this code in the Telegram bot to activate your account

Live

CLI Terminal

Full Ping protocol access from your terminal. Scriptable, headless, pipe-friendly. Built for operators.

curl -O https://raw.githubusercontent.com/attacless/ping/main/ping.py && pip install cryptography websockets certifi && python ping.py
Coming soon

Desktop & Mobile

Standalone native apps for macOS, Windows, Linux, iOS, and Android.

The loudest room is the
safest place to whisper

Largest anonymity set of any P2P messenger

Entropy Positioning Map
HIGH ENTROPY (DISTINCTIVE) LOW ENTROPY (DISSOLVED) MASS PLATFORM NICHE PLATFORM
Signal
WhatsApp E2EE
Briar
Telegram Native
Threema
Ping