Documentation

Ekko Overview

Understand how Ekko works, why it exists, and the technology behind decentralized, encrypted messaging.

Why Ekko Exists

Every mainstream messaging app — WhatsApp, Signal, iMessage, Telegram — relies on central servers operated by a single company. Even when messages are encrypted, the server still knows who you're talking to, when, and how often. If the company goes down, gets hacked, or is compelled by a government to hand over data, your communication is at risk.

Ekko takes a fundamentally different approach: there is no server. Your messages travel through decentralized networks that no single entity controls. Your identity is a cryptographic key stored only on your device — not an email address, not a phone number, not a username tied to any service.

Who Ekko is For

Journalists & Activists

Operating in environments where communication metadata can be dangerous

Privacy-Conscious Individuals

Who don't want their social graph harvested

Communities with Unreliable Internet

Where Bluetooth and mesh networking keep communication alive

Anyone Who Believes

Messaging infrastructure shouldn't depend on the goodwill of a corporation

How Messages Travel

Ekko uses five different communication paths to deliver your messages. The app automatically selects the best available path.

1

Bluetooth (BLE)

When you're physically near someone (within about 30 feet), Ekko sends messages directly over Bluetooth. No internet needed. This is the fastest path and works even if all networks are down.

Your phone quietly advertises its presence via Bluetooth. When a contact's phone is nearby, the two devices establish an encrypted tunnel and exchange messages instantly.

2

Internet (DHT)

When you're not nearby, Ekko uses a global peer-to-peer network called a Distributed Hash Table — the same kind of network that powers BitTorrent.

Think of it like a public bulletin board where messages are written in a code only the intended recipient can read. The bulletin board is maintained by thousands of independent computers worldwide.

3

Onion Routing (Tor)

For maximum privacy, Ekko establishes a direct connection through the Tor network. Messages bounce through multiple encrypted layers so neither party reveals their location.

Each device creates a hidden address that's only reachable through Tor. Messages travel through three layers of encryption across different countries.

4

Quick Relay (iroh)

Some networks block direct connections. Ekko uses QUIC to punch through barriers and establish a direct peer-to-peer link.

Devices exchange small endpoint IDs through the decentralized network, then connect directly using a protocol faster and more reliable than traditional connections.

5

Mesh Relay (BLE Gossip)

After a normal Bluetooth exchange, devices share encrypted blobs meant for other people. Every Ekko device acts as a potential courier.

The relay person can't decrypt messages and doesn't even know who the intended recipients are. This extends Ekko's reach into areas with spotty connectivity.

Why Messages Take Longer Than WhatsApp

The latency is the privacy

The extra time isn't a bug — it's the natural consequence of removing the middleman. Every second of latency represents a layer of privacy protection.

No server logs your message timing

No company maps your relationships

No single point can be compromised or censored

Messages travel through independently operated networks

For nearby contacts, Bluetooth delivers messages faster than any centralized app. For distant contacts, the trade-off is seconds of latency in exchange for communication that no third party can monitor, block, or control.

Development Roadmap

DHT Subscription Service

Planned
  • Push notifications instead of polling
  • Extended message retention
  • Priority publishing for faster propagation
  • Larger payloads without chunking overhead

Relay Subscription Service

Planned
  • Dedicated high-availability relay infrastructure
  • Offline message queuing with E2E encryption
  • Faster delivery approaching centralized messenger speeds
  • Geographic distribution for low-latency connections

Pricing Philosophy

Free tier remains fully functional — all transports, all features
Subscriptions enhance speed and reliability, not access
No data monetization — never ads, never metadata harvesting
Transparent, independently auditable infrastructure

Ready for the technical deep-dive?

Transport Security Documentation