ALPHA TESTING PHASE

Total
Privacy

Entropy is a high-performance desktop messenger built for those who demand absolute security. We've removed the use of PII(Personal Identifyinng Information) such as phone numbers/emails and IP addresses and avoided leakage of metadata by building on signal's open source protocol. It's simple, native, and mathematically private.

Security_Status 100%
Identity
ANONYMOUS
Metadata
NIL
Session Activity:
Initializing secure local vault...
Vault verified. Ready for peer connection.

Privacy Shouldn't Require a Phone Number.

Most "private" messaging apps still link your identity to a phone number or email. Entropy breaks this link entirely. you are identified only by a locally generated random cryptographic hash.

👤

No Personal Data

No phone numbers. No emails. No "Sign in with Google". Just open the app and generate your unique identity.

💾

Self-Sovereign History

Your messages live on your device, not in the cloud. Your conversation history is stored locally in an encrypted database that only you control.

🛡️

Future-Proof Security

Built on the open-source Signal Protocol with post-quantum cryptography, protecting your conversations today and tomorrow.

🌐

Blinded Routing

Messages are routed using cryptographic hash identifiers only. The relay never learns the sender's identity, ensuring connections remain anonymous.

🧅

Tor & Custom Proxy Support

Optionally route your traffic through Tor or custom SOCKS5 proxies for an additional layer of network anonymity, making it nearly impossible to trace your connection.

🎭

Decoy Key Fetching

When fetching keys to start a conversation, the client automatically requests keys for 4 random users too. The server can't determine who you actually want to talk to.

GUIDE

How to Use Entropy

Four simple steps to total communication freedom.

STEP 01

Generate Identity

When you first launch Entropy, it creates a secure local vault. This generates your unique ID—a string of characters that represents you without revealing anything about you.

STEP 02

Add your Contacts

Share your ID with friends via any secure channel. For ease of use, you can also create a custom nickname/username to share instead of the complex hex ID. Once they add you, you establish a direct, encrypted handshake.

STEP 03

Chat with Confidence

Every interaction is secured by Signal Protocol with post-quantum extensions. Beyond content security, Entropy masks your metadata—padding every packet to a uniform size and also implementing jitter and constant traffic flow—so that your activity patterns remain invisible to network observers.

STEP 04

Total Control

At any time, you can wipe your entire vault. Because we don't store your data on our servers, once you delete it locally, it's gone from the universe forever.

CAPABILITIES

Engineered for Security.

Behind the simple interface lies a powerhouse of cryptographic protection.

Anti-Surveillance Suite

Entropy moves beyond encryption, implementing active countermeasures against advanced network analysis and physical device compromise.

X3DH+PQ Handshake:

Post-quantum cryptography combined with Signal's X3DH key agreement.

Double Ratchet:

Signal Protocol's self-healing session keys rotate with every message.

Sealed Sender:

Identity-blinding ensures the relay never knows who sent a message.

Message Authentication:

Cryptographic signatures prevent tampering and impersonation.

Traffic Normalization:

1536-byte constant packet sizes mask all payload signatures.

PoW Anti-Spam:

Dynamic Proof-of-Work prevents Sybil and network-level attacks.

Zero-Persistence Relay:

RAM-only, volatile storage with automatic message deletion after delivery.

Panic Password:

Emergency wipe password instantly clears all data; 10 failed logins trigger auto-wipe.

Tor/Proxy Routing:

Optional Tor or custom SOCKS5 proxy support for network-level anonymity.

Decoy Fetching:

Client fetches 4 random user keys alongside target to hide communication intent.

GET FIRST ACCESS

Get Early Access

Entropy is currently in active development/testing.

DEMO

See it in Action

Enter a message to see how Entropy transforms it before it leaves your device.