Total
Privacy
Entropy is a high-performance desktop messenger built for those who demand absolute security. We've removed the use of PII(Personal Identifyinng Information) such as phone numbers/emails and IP addresses and avoided leakage of metadata by building on signal's open source protocol. It's simple, native, and mathematically private.
Privacy Shouldn't Require a Phone Number.
Most "private" messaging apps still link your identity to a phone number or email. Entropy breaks this link entirely. you are identified only by a locally generated random cryptographic hash.
No Personal Data
No phone numbers. No emails. No "Sign in with Google". Just open the app and generate your unique identity.
Self-Sovereign History
Your messages live on your device, not in the cloud. Your conversation history is stored locally in an encrypted database that only you control.
Future-Proof Security
Built on the open-source Signal Protocol with post-quantum cryptography, protecting your conversations today and tomorrow.
Blinded Routing
Messages are routed using cryptographic hash identifiers only. The relay never learns the sender's identity, ensuring connections remain anonymous.
Tor & Custom Proxy Support
Optionally route your traffic through Tor or custom SOCKS5 proxies for an additional layer of network anonymity, making it nearly impossible to trace your connection.
Decoy Key Fetching
When fetching keys to start a conversation, the client automatically requests keys for 4 random users too. The server can't determine who you actually want to talk to.
How to Use Entropy
Four simple steps to total communication freedom.
Generate Identity
When you first launch Entropy, it creates a secure local vault. This generates your unique ID—a string of characters that represents you without revealing anything about you.
Add your Contacts
Share your ID with friends via any secure channel. For ease of use, you can also create a custom nickname/username to share instead of the complex hex ID. Once they add you, you establish a direct, encrypted handshake.
Chat with Confidence
Every interaction is secured by Signal Protocol with post-quantum extensions. Beyond content security, Entropy masks your metadata—padding every packet to a uniform size and also implementing jitter and constant traffic flow—so that your activity patterns remain invisible to network observers.
Total Control
At any time, you can wipe your entire vault. Because we don't store your data on our servers, once you delete it locally, it's gone from the universe forever.
Engineered for Security.
Behind the simple interface lies a powerhouse of cryptographic protection.
Anti-Surveillance Suite
Entropy moves beyond encryption, implementing active countermeasures against advanced network analysis and physical device compromise.
Post-quantum cryptography combined with Signal's X3DH key agreement.
Signal Protocol's self-healing session keys rotate with every message.
Identity-blinding ensures the relay never knows who sent a message.
Cryptographic signatures prevent tampering and impersonation.
1536-byte constant packet sizes mask all payload signatures.
Dynamic Proof-of-Work prevents Sybil and network-level attacks.
RAM-only, volatile storage with automatic message deletion after delivery.
Emergency wipe password instantly clears all data; 10 failed logins trigger auto-wipe.
Optional Tor or custom SOCKS5 proxy support for network-level anonymity.
Client fetches 4 random user keys alongside target to hide communication intent.
Get Early Access
Entropy is currently in active development/testing.
See it in Action
Enter a message to see how Entropy transforms it before it leaves your device.