Chat Module

ZeroMetadataMessaging

Communication that leaves no trace. Every message encrypted before it leaves your device, decrypted only by the intended recipient. No central servers to subpoena, no metadata to analyze, no phone number required, no backdoors to exploit.

What is zero-metadata messaging? Traditional apps store who you talk to, when, and how often — even if messages are encrypted. Zbelthas stores nothing. No contact lists, no timestamps, no read receipts. If it doesn't exist, it can't be subpoenaed.

0
Metadata Stored
0
Central Servers
1000+
Group Members
5GB
File Transfers
End-to-End Encryption

Mathematically unbreakable forward secrecy

Every message encrypted before it leaves your device using a fresh ephemeral ML-KEM key. Compromising one session key reveals nothing about past or future sessions — mathematical guarantees, not promises.

Key exchange
ML-KEM-1024
Message auth
ML-DSA-87
Cipher
AES-256-GCM
Forward secrecy
Per-message
Perfect Forward Secrecy

Past sessions stay private

Ephemeral keys are deleted immediately after use. Even a full device compromise cannot decrypt previously sent messages.

Zero Metadata

No behavioral fingerprint

  • No message timestamps stored
  • No contact list on servers
  • No read receipts logged
  • No typing indicators transmitted
Decentralized P2P

No central servers to attack

Messages route through a distributed P2P network. No single server stores your conversations — even temporarily. One subpoena, one hack, one rogue employee — none of it can expose what was never stored. No subpoena can retrieve what doesn't exist.

No MITM possibleNo server-side storageNo account requiredTor compatible
Anonymous Identity

No phone number

Cryptographic identity derived from your keys. Your identity permanently linked to a key pair — not your phone number. No personal information required to create an account or start communicating.

Self-Destruct

Messages that disappear

Set per-message or per-conversation expiry. Deletion is cryptographic — not just a UI toggle. The key is destroyed; the ciphertext becomes meaningless.

No Backdoors

Mathematically impossible

The architecture makes backdoors structurally impossible. If a backdoor exists for one, it exists for all — including hackers and hostile nations. We chose mathematics over compliance theater.