Technical
How Does End-to-End Encryption Work?
Quick Answer
Your device encrypts the message before sending it. Only the recipient's device can decrypt it. The server in between only sees scrambled data it cannot read.
Detailed Explanation
End-to-end encryption works in three steps: (1) Key generation — a secret encryption key is created. In zkChat, this happens in your browser using the Web Crypto API. (2) Encryption — your message is scrambled using the key and an algorithm (AES-256-GCM). The result is ciphertext that looks like random data. (3) Transmission and decryption — the ciphertext is sent through the server (which can't decrypt it) to the recipient, whose browser uses the same key to decrypt it back to readable text. In zkChat, the key is shared via the URL fragment, which browsers never send to servers.
Related Questions
What Is AES-256 Encryption?
AES-256 is the Advanced Encryption Standard with a 256-bit key — the same encryption used by the US military, banks, and governments worldwide. It's considered unbreakable.
Is End-to-End Encryption Really Secure?
Yes. Properly implemented E2EE using algorithms like AES-256-GCM is mathematically secure — breaking it would take longer than the age of the universe with current technology.
What Is Zero-Knowledge Encryption?
Zero-knowledge encryption means the service provider is technically unable to access your data — not just promising not to, but cryptographically prevented from doing so.
Try It Yourself
Experience military-grade encrypted messaging. No signup, no phone number, no app.