Built for Privacy
Every feature in Ekko is designed around a single principle: your communication belongs to you. No compromises, no trade-offs on security.
Messaging
Encrypted Text Messaging
Every message is encrypted end-to-end with ChaCha20-Poly1305. There is no Ekko server that could read your messages.
File & Photo Sharing
Send documents, photos, and videos of any size. Large files are automatically chunked and reassembled across transports.
Group Conversations
Create groups, add members, and send encrypted group messages. Group invitations require explicit acceptance.
Message Reactions
React to messages with emojis for quick, expressive responses.
GIF Support
Built-in GIF picker for expressive conversations.
Disappearing Messages
Set messages to auto-delete after 5 minutes, 1 hour, 1 day, or 1 week.
Identity & Contacts
No Accounts Required
Your identity is generated on your device as a cryptographic keypair. Nothing to register, no email, no phone number.
QR Code Contact Exchange
Add contacts by scanning each other's QR codes in person. Ensures you're connecting with the right person.
Nearby Discovery
Find and add contacts via Bluetooth when you're in the same room. No internet required.
Profile Sharing Controls
Choose whether to share your profile picture and display name with all contacts or selected individuals.
Contact Verification
Every contact has a unique fingerprint you can verify in person to confirm their identity.
Security
Automatic Database Encryption
The database on your device is encrypted with a randomly generated passphrase. Security is the default.
Biometric Unlock
Use Face ID or Touch ID to access the app on supported devices.
Local-Only Storage
All messages and contacts live on your device. No cloud backup that could be subpoenaed or breached.
Backup & Restore
Export your encrypted database for safekeeping. The passphrase is available in settings when you need it.
Transport Layers
Bluetooth (BLE)
Face-to-face messaging within ~30 feet. Fastest path, works with all networks down. Noise XX encrypted tunnel.
DHT Network
Global peer-to-peer network (BitTorrent Mainline DHT). Encrypted messages stored and retrieved without any central server.
Tor Onion Routing
Direct .onion-to-.onion connections through 3 encrypted hops. Maximum anonymity — no IP addresses revealed.
QUIC Relay (iroh)
NAT-busting P2P connections using modern QUIC protocol. Punches through corporate firewalls and strict carriers.
BLE Mesh Gossip
Devices relay encrypted messages for others. Extends Ekko's reach into areas with spotty connectivity.
Cross-Platform
Available everywhere you need it.
iOS
iPhone & iPad
AvailableAndroid
All devices
AvailablemacOS
Native app
AvailableWindows
In development
Coming Soon