Ekko Overview
Understand how Ekko works, why it exists, and the technology behind decentralized, encrypted messaging.
Why Ekko Exists
Every mainstream messaging app — WhatsApp, Signal, iMessage, Telegram — relies on central servers operated by a single company. Even when messages are encrypted, the server still knows who you're talking to, when, and how often. If the company goes down, gets hacked, or is compelled by a government to hand over data, your communication is at risk.
Ekko takes a fundamentally different approach: there is no server. Your messages travel through decentralized networks that no single entity controls. Your identity is a cryptographic key stored only on your device — not an email address, not a phone number, not a username tied to any service.
Who Ekko is For
Journalists & Activists
Operating in environments where communication metadata can be dangerous
Privacy-Conscious Individuals
Who don't want their social graph harvested
Communities with Unreliable Internet
Where Bluetooth and mesh networking keep communication alive
Anyone Who Believes
Messaging infrastructure shouldn't depend on the goodwill of a corporation
How Messages Travel
Ekko uses five different communication paths to deliver your messages. The app automatically selects the best available path.
1Bluetooth (BLE)
When you're physically near someone (within about 30 feet), Ekko sends messages directly over Bluetooth. No internet needed. This is the fastest path and works even if all networks are down.
Bluetooth (BLE)
When you're physically near someone (within about 30 feet), Ekko sends messages directly over Bluetooth. No internet needed. This is the fastest path and works even if all networks are down.
Your phone quietly advertises its presence via Bluetooth. When a contact's phone is nearby, the two devices establish an encrypted tunnel and exchange messages instantly.
2Internet (DHT)
When you're not nearby, Ekko uses a global peer-to-peer network called a Distributed Hash Table — the same kind of network that powers BitTorrent.
Internet (DHT)
When you're not nearby, Ekko uses a global peer-to-peer network called a Distributed Hash Table — the same kind of network that powers BitTorrent.
Think of it like a public bulletin board where messages are written in a code only the intended recipient can read. The bulletin board is maintained by thousands of independent computers worldwide.
3Onion Routing (Tor)
For maximum privacy, Ekko establishes a direct connection through the Tor network. Messages bounce through multiple encrypted layers so neither party reveals their location.
Onion Routing (Tor)
For maximum privacy, Ekko establishes a direct connection through the Tor network. Messages bounce through multiple encrypted layers so neither party reveals their location.
Each device creates a hidden address that's only reachable through Tor. Messages travel through three layers of encryption across different countries.
4Quick Relay (iroh)
Some networks block direct connections. Ekko uses QUIC to punch through barriers and establish a direct peer-to-peer link.
Quick Relay (iroh)
Some networks block direct connections. Ekko uses QUIC to punch through barriers and establish a direct peer-to-peer link.
Devices exchange small endpoint IDs through the decentralized network, then connect directly using a protocol faster and more reliable than traditional connections.
5Mesh Relay (BLE Gossip)
After a normal Bluetooth exchange, devices share encrypted blobs meant for other people. Every Ekko device acts as a potential courier.
Mesh Relay (BLE Gossip)
After a normal Bluetooth exchange, devices share encrypted blobs meant for other people. Every Ekko device acts as a potential courier.
The relay person can't decrypt messages and doesn't even know who the intended recipients are. This extends Ekko's reach into areas with spotty connectivity.
Why Messages Take Longer Than WhatsApp
The latency is the privacy
The extra time isn't a bug — it's the natural consequence of removing the middleman. Every second of latency represents a layer of privacy protection.
No server logs your message timing
No company maps your relationships
No single point can be compromised or censored
Messages travel through independently operated networks
For nearby contacts, Bluetooth delivers messages faster than any centralized app. For distant contacts, the trade-off is seconds of latency in exchange for communication that no third party can monitor, block, or control.
Development Roadmap
DHT Subscription Service
Planned- Push notifications instead of polling
- Extended message retention
- Priority publishing for faster propagation
- Larger payloads without chunking overhead
Relay Subscription Service
Planned- Dedicated high-availability relay infrastructure
- Offline message queuing with E2E encryption
- Faster delivery approaching centralized messenger speeds
- Geographic distribution for low-latency connections
Pricing Philosophy
Ready for the technical deep-dive?
Transport Security Documentation