Secure. Persistent. Untraceable.

Verified
Messaging

Zero-Knowledge encrypted comms. Share your handle, not a password. Keep your graph local with our encrypted Contact Vault.

Military-Grade Privacy

Built for whistleblowers, journalists, and privacy-conscious organizations.

Verified Messaging

Claim your permanent handle (e.g. ntk.sh/u/@you). Peers can message you directly without needing a new link every time.

Trusted Identity

Verify peers via their public Identity Key. Once trusted, future connections are automatic and secure.

Zero-Knowledge Vault

Your contacts and graph are encrypted locally with your Biometric Passkey. We can't see who you know.

Transient & Burnable

Perfect Forward Secrecy. Data vanishes from RAM on completion. Sender can trigger 'Burn-on-Read' to wipe local traces.

Trust No One. Verify Everything.

Our Zero-Knowledge architecture ensures that we cannot read your messages or access your files. Your Identity Key never leaves your device.

Click to audit the pipeline

Operational Workflow

Secure comms establishment protocol.

1. Get Handle

Claim your permanent, cryptographically secured handle (e.g. @username). No more regenerating links for every chat.

2. Verified Messaging

Peers simply visit your handle URL. They verify your Identity Key once, and are then trusted forever.

3. Zero-Knowledge

Save trusted contacts to your local encrypted vault. Your contact graph never leaves your device in plaintext.

4. Secure Comms

Share files, chat securely, or start a voice call. All data is encrypted client-side. Using 'Zip & Lock', files can be double-encrypted.