AES-256-GCM Encryption

Military-Grade
Privacy For Everyday.

Ephemeral end-to-end encrypted chat, file-drop, and one-time messages. No accounts. No metadata. No logs. No identities. Everything burns the moment you leave.

Why zkChat is More Private Than “Private Messengers”

AES-256-GCM: The Gold Standard

zkChat uses AES-256-GCM, the same symmetric encryption primitive used in banking infrastructure, military and government-grade secure storage, and TLS connections protecting financial data worldwide.

Encryption Happens in Your Browser

All encryption and decryption happens entirely in your browser before any data leaves your device. The encryption key lives in the URL fragment (#key=...), which browsers never send to servers.

We See Only Random Ciphertext

The relay server, CDNs, proxies, and infrastructure providers see only random ciphertext—never keys or plaintext. Even if compelled or compromised, we cannot decrypt what we don't have the keys for.

Everything Burns

  • Rooms auto-burn when all participants leave
  • One-time messages burn on first read
  • File drops burn on download or after TTL

True Anonymity

  • No accounts, no phone numbers, no emails
  • No analytics, no tracking, no profiling
  • zkChat does not know who you are

zkChat vs Other "Private" Messengers

A factual comparison of privacy features. We keep it honest.

zkChat vs Signal: Privacy Comparison

FeaturezkChatSignal
End-to-end encryption by defaultYes (AES-256-GCM)Yes (Signal Protocol)
Requires account / phone numberNoPhone required
Server sees message contentNo (mathematically impossible)No
Server stores metadata / identifiersNoYes (phone, contacts)
Key stays only on device / in browserYes (URL fragment, never sent)Yes
Anonymous access (no signup)YesNo
Self-destructing rooms / sessionsYes (auto-burn when empty)Partial (disappearing messages)
One-time self-destruct messagesYesNo
One-time encrypted file dropYesNo
Messages stored after you close the appNo (memory only)Yes, until deleted
Browser-native, no install requiredYesNo (app required)
Designed to minimize metadataYes (zero metadata by design)Partial

This comparison is based on publicly available information and may not reflect recent updates. We encourage you to verify claims independently.

How zkChat Works (Without Trusting Us)

Cryptographic guarantees that don't require faith in our good intentions.

Key Stays in Your Browser

A 256-bit key is generated via Web Crypto API directly in your browser. This key is encoded and placed in the URL #fragment. By design, browsers never send anything after the # to servers or proxies.

Server sees: /room/abc123
Server does NOT see: #key=8f3a9b...

Server Sees Only Ciphertext

Messages, OTMs, and files are encrypted using AES-256-GCM. The server only relays or stores ciphertext blobs. Even a full server compromise reveals no plaintext and no keys.

Browser→ AES-256-GCM →CiphertextRelayCiphertext→ AES-256-GCM →Browser

Everything Self-Destructs

No historical log, no archive, no inbox. Privacy isn't a setting—it's the architecture.

Rooms

Destroyed when all disconnect

OTMs

Burned on first read

Files

Deleted after download or 24h

Military-Grade Encryption for Real-World Privacy

In an era where every message, file, and conversation leaves a permanent digital footprint, zkChat offers something radically different: ephemeral, zero-knowledge communication built on military-grade AES-256 encryption. This isn't security theater—it's cryptographic architecture designed from the ground up for real-world privacy.

The Problem with “Private” Messengers

Most messaging platforms claim end-to-end encryption, but encryption is only part of the story. Metadata—who you talk to, when, how often, from where—often reveals as much as message content. Traditional messengers require accounts linked to phone numbers or emails, creating permanent identity records. They store message history, contact graphs, and behavioral data on servers you don't control. Even with encrypted content, this metadata enables surveillance capitalism, traffic correlation attacks, and legal compulsion.

zkChat's Zero-Knowledge Architecture

zkChat takes a fundamentally different approach. Every chat room, one-time message, and file drop uses AES-256-GCM encryption performed entirely in your browser. The encryption key is generated locally and embedded in the URL fragment—the part after the # that browsers never transmit to servers. Our relay sees only random ciphertext bytes. We cannot decrypt your messages because we never possess the keys.

Anonymous by Architecture, Not Policy

Unlike services that promise not to log your data (promises that can change or be legally compelled), zkChat's privacy guarantees are architectural. We require no accounts, no phone numbers, no emails. There is no user database to breach or subpoena. Rooms exist only in memory and vanish when participants leave. One-time messages are cryptographically destroyed after first read. This isn't a policy decision—it's how the system is built.

Real Threats, Real Protection

Consider the threats that matter: corporate data harvesting (we collect nothing to harvest), government surveillance (we have no decryption capability to provide), server breaches (attackers would find only meaningless ciphertext), network observers (ISPs and employers see only encrypted traffic). The only remaining attack vector is endpoint compromise—and no communication tool can protect you if your device is already compromised.

Built for Sensitive Communication

zkChat is purpose-built for scenarios where privacy is non-negotiable: journalists protecting sources, legal teams discussing privileged matters, activists organizing under repressive regimes, businesses sharing confidential information, or anyone who simply values communication that's nobody's business but yours. Whether you're sharing a password, coordinating a project, or having a conversation that's nobody's business but yours, zkChat ensures that when the chat ends, the evidence ends with it.

This is what privacy-first messaging actually looks like: browser-based encryption, fragment-isolated keys, ephemeral state, and zero-knowledge architecture. Not promises—mathematics.

Frequently Asked Questions