Encrypted messaging that leaves nothing behind.
Messages exist only in transit. No servers store them. No cloud backs them up.
No archive survives to be seized, subpoenaed, or sold.
Ephemeral by design.
Every message is encrypted before it touches any relay. The relay never sees a conversation.
That is not a feature, that is the default.
Each user generates an X25519 keypair on first launch. Shared secrets are derived via Diffie-Hellman and fed into HKDF-SHA256 with a room-scoped salt, producing unique per-peer symmetric keys.
All message content is encrypted with ChaCha20-Poly1305 AEAD, providing both confidentiality and integrity. Each message uses a fresh 12-byte random nonce.
Chain keys ratchet forward after each send (HMAC-SHA256), providing forward secrecy. Keys rotate every 100 messages or on any membership change.
Sensitive operations (DMs, reactions, receipts, key exchanges) are wrapped in privacy envelopes, a second encryption layer with independent HKDF derivation, hiding both content and operation type from relays.
Messages are padded to predefined bucket sizes (256B → 512KB) before encryption, preventing traffic analysis from inferring message length. Buckets follow a power-of-two scheme to minimize overhead.
User identity is a secp256k1 keypair.
Events are signed with BIP-340 Schnorr signatures, providing non-repudiation and relay-verifiable authenticity.
Every other messenger creates data and builds defenses around it. Ping's primary defense is the absence of the data itself. The architecture is designed so that no entity, not the relays, not the client, ever has access to message content or user communication graphs.
Private keys are encrypted at rest and protected by configurable local authentication.
4-digit PIN encrypts the identity at rest using PBKDF2 with 200,000 iterations + a device-bound key derived from WebCrypto. Rate-limited: 3 attempts, then 30s lockout doubling to 1 hour. Countdown displayed live.
Optional fingerprint/face unlock via WebAuthn platform authenticators. Stores a PRF-derived credential that can decrypt the identity without PIN entry. Falls back gracefully if biometrics unavailable.
Private keys in localStorage are AES-GCM encrypted with a key derived from PIN + device salt + PBKDF2. Even with device access, keys require the PIN or biometric to decrypt.
Full identity + room state can be exported as an encrypted JSON blob for device migration. Import restores the complete session including cryptographic identity and room memberships.
Not a demo. A real P2P messenger, with every feature encrypted end-to-end by default.
Join multiple rooms with independent message streams, peer lists, and sender key states. Room switching is instant.
Pairwise X25519 envelopes within rooms. Slide-up panel with gesture dismiss and per-peer thread persistence.
Per-conversation timers, 30 seconds to 24 hours. Messages auto-delete from local display.
Tap-and-hold reactions sent as privacy-enveloped events. Full emoji picker with skin tone support.
Privacy-enveloped confirmations routed through pairwise encryption. Checkmarks on sent messages.
Tap-to-reply with quoted previews. References embedded in the encrypted payload and rendered as linked blocks.
Standalone zero-knowledge tools accessible directly from chat.
Client-side file encryption via zero-knowledge relay. Decryption key lives in the URL fragment, never sent to the server. Optional password. Configurable expiry.
Encrypted short URLs with expiry and optional password. Destination encrypted client-side before storage. Quick-send to any room or DM.
Generate QR codes for any text or URL. Client-side rendering with error correction. Send directly into chat.
One protocol. Multiple interfaces. Same zero-knowledge guarantees across every client.
Primary client. Launch directly inside Telegram with no install. Full encryption, rooms, DMs, and tools.
Loading...
Paste this code in the Telegram bot to activate your account
Full Ping protocol access from your terminal. Scriptable, headless, pipe-friendly. Built for operators.
curl -O https://raw.githubusercontent.com/attacless/ping/main/ping.py && pip install cryptography websockets certifi && python ping.py
Standalone native apps for macOS, Windows, Linux, iOS, and Android.
Largest anonymity set of any P2P messenger