Built for Privacy

Every feature in Ekko is designed around a single principle: your communication belongs to you. No compromises, no trade-offs on security.

Messaging

Encrypted Text Messaging

Every message is encrypted end-to-end with ChaCha20-Poly1305. There is no Ekko server that could read your messages.

File & Photo Sharing

Send documents, photos, and videos of any size. Large files are automatically chunked and reassembled across transports.

Group Conversations

Create groups, add members, and send encrypted group messages. Group invitations require explicit acceptance.

Message Reactions

React to messages with emojis for quick, expressive responses.

GIF Support

Built-in GIF picker for expressive conversations.

Disappearing Messages

Set messages to auto-delete after 5 minutes, 1 hour, 1 day, or 1 week.

Identity & Contacts

No Accounts Required

Your identity is generated on your device as a cryptographic keypair. Nothing to register, no email, no phone number.

QR Code Contact Exchange

Add contacts by scanning each other's QR codes in person. Ensures you're connecting with the right person.

Nearby Discovery

Find and add contacts via Bluetooth when you're in the same room. No internet required.

Profile Sharing Controls

Choose whether to share your profile picture and display name with all contacts or selected individuals.

Contact Verification

Every contact has a unique fingerprint you can verify in person to confirm their identity.

Security

Automatic Database Encryption

The database on your device is encrypted with a randomly generated passphrase. Security is the default.

Biometric Unlock

Use Face ID or Touch ID to access the app on supported devices.

Local-Only Storage

All messages and contacts live on your device. No cloud backup that could be subpoenaed or breached.

Backup & Restore

Export your encrypted database for safekeeping. The passphrase is available in settings when you need it.

Transport Layers

Bluetooth (BLE)

Face-to-face messaging within ~30 feet. Fastest path, works with all networks down. Noise XX encrypted tunnel.

DHT Network

Global peer-to-peer network (BitTorrent Mainline DHT). Encrypted messages stored and retrieved without any central server.

Tor Onion Routing

Direct .onion-to-.onion connections through 3 encrypted hops. Maximum anonymity — no IP addresses revealed.

QUIC Relay (iroh)

NAT-busting P2P connections using modern QUIC protocol. Punches through corporate firewalls and strict carriers.

BLE Mesh Gossip

Devices relay encrypted messages for others. Extends Ekko's reach into areas with spotty connectivity.

Cross-Platform

Available everywhere you need it.

iOS

iPhone & iPad

Available

Android

All devices

Available

macOS

Native app

Available

Windows

In development

Coming Soon