v2.1 · secure channel
CHANNEL ACTIVE
tyst@node:~$ init --protocol ecdh-p256
[ OK ] ephemeral keypair generation ready
[ OK ] aes-gcm-256 cipher loaded
[ OK ] anonymous relay configured · delay 2–47s
[ OK ] self-destruct armed · ttl 5s post-read
tyst@node:~$ awaiting transmission
compose encrypted message
0 / 500
your identity is never revealed — not even to the server how it works ↗
tyst@node:~$ encrypt --send
generating ephemeral keypair
encrypting message
routing via anonymous relay
TRANSMITTED
[ OK ] message released · origin unknown
payload is in transit. will be destroyed 5s after recipient opens it.
NO PUBKEY
[ ERR ] recipient has no registered key
this user must sign in at least once to receive encrypted messages.
◆ secure inbox
no messages
anonymous 5
self-destruct armed no record kept
PROTOCOL
1
sender identity is untraceable
messages route through an anonymous relay. the server only sees the relay IP, never yours. even if the server is seized, your identity is not there.
2
server cannot read your message
encryption runs on your device before transmission. your private key never leaves your device — the server holds ciphertext only.
3
timing is randomised
a random 2–47 second delay is injected so timing correlation attacks cannot identify the sender.
4
destroyed after reading
5 seconds after the recipient opens the message it is permanently purged from the server. no backup. no log.
protocol · ecdh p-256 · aes-gcm 256-bit · hkdf-sha256
padding · 256-byte blocks — payload size does not leak
relay · all identifying headers stripped before forwarding
storage · private key is device-only, never transmitted
TYST
anonymous channel. identity unverified.
by connecting you confirm you are 17+ and accept full responsibility for transmitted content.
CONNECT
lost PIN = lost account · no recovery possible