Military-Grade Privacy
Built for whistleblowers, journalists, and privacy-conscious organizations.
Verified Messaging
Claim your permanent handle (e.g. ntk.sh/u/@you). Peers can message you directly without needing a new link every time.
Trusted Identity
Verify peers via their public Identity Key. Once trusted, future connections are automatic and secure.
Zero-Knowledge Vault
Your contacts and graph are encrypted locally with your Biometric Passkey. We can't see who you know.
Transient & Burnable
Perfect Forward Secrecy. Data vanishes from RAM on completion. Sender can trigger 'Burn-on-Read' to wipe local traces.
Operational Workflow
Secure comms establishment protocol.
1. Get Handle
Claim your permanent, cryptographically secured handle (e.g. @username). No more regenerating links for every chat.
2. Verified Messaging
Peers simply visit your handle URL. They verify your Identity Key once, and are then trusted forever.
3. Zero-Knowledge
Save trusted contacts to your local encrypted vault. Your contact graph never leaves your device in plaintext.
4. Secure Comms
Share files, chat securely, or start a voice call. All data is encrypted client-side. Using 'Zip & Lock', files can be double-encrypted.