Start new cyphIntroFeaturesAboutGetting Started BlogFAQPricingRegisterMenu
Getting Started
GitHub icon GitHub
Twitter icon Twitter
Facebook icon Facebook

Welcome Betalisters! Penn's Sunday School Jordan, Jesse, Go! We The People Sawbones Judge John Hodgman My Brother, My Brother and Me The Security Brief listeners!

Sign up now, and you'll get extra priority on our waitlist for a Cyph beta account.

Secure your {{ui.features[ui.featureIndex]}} in one click.

Laptop displaying secure Cyph video call  
Phone displaying secure Cyph video call  

Just send a link — no signups or downloads required!

Down arrow
Up arrow
We hope you enjoyed our quick demo! Just click the "start new cyph" button to use it for real.
Tell your friends.

About Cyph

Cyph is a secure communication tool designed to be extremely friendly for users of any technical skill level, providing such features as encrypted video calling and file transfers to both individuals and businesses. The patent-pending technology underpinning our software was built by two former SpaceX engineers — and rigorously vetted against a threat model focused on nation-state-level attacks — with the vision of defending innocent people from increasingly sophisticated rogue hackers and invasive government mass surveillance.

Ryan Lester, cofounder of Cyph
Ryan Lester, CEO
Baron Joshua Cyrus Boehm, cofounder of Cyph
Baron Joshua Cyrus Boehm, COO

Ryan and Josh have been friends for nearly two decades, in that time having spent many all-nighters working closely together on various software projects. Most recently, they were on the internal software quality team at Elon Musk's SpaceX, where Ryan drove the development of next-gen test automation tooling and frameworks while Josh led software quality assurance efforts.

Over the years, the difficulty of communicating privately online had become a constant thorn in their side. Existing solutions were largely cumbersome to use, had major functional limitations (lack of support for video calling, restrictions to small sets of platforms and operating systems, etc.), and often came with "gotchas" that would silently compromise confidentiality when one didn't have the expertise to fully understand the tool.

They knew there could be a better way, so they created Cyph.

Press The Button

The button will take you into the Cyph application, where you'll be given a custom shortlink to share with one friend.

When your friend opens this link, the conversation will begin.

Business Pricing


Enterprise Custom

Secure your business with Cyph encryption. Integrate into your app, site, or service with our API and white labeling. Work directly with our product development team to create custom features that meet your and your customers' needs.

Beta Features, Plus:



User Management


Custom Theming


Self Hosting


API Access


White Label


Custom Features

Contact Us

Early Beta Access

Get early access to Cyph for your business, as well lifetime priority support. Have a feature you really want to see in Cyph? Your requests are sent straight to the founders.


Powerful Encryption


One Click Access


Instant Messaging


Picture Messaging


Video Calling


Voice Calling


File Transfers

Limited Time Offer


Unlimited Sessions


Lifetime Priority Support

${{ui.betaPlan}} (one time)

Telehealth Custom

Expand your client base by allowing virtual doctor visits from anywhere with our HIPAA-compliant encrypted video calling. Securely send and receive patient files.


Beta Features, Plus:




Patient Scheduling


Payment Processing


API Access


White Label


Custom Features

Contact Us

I'm sorry, but your cyph is in another castle...

Funny Mario reference

Reasons why you may have landed here:

  • A glitch in the matrix
  • You're just guessing random URLs
  • We broke something

Contact Us

If you prefer to use your own email client, feel free to shoot us a message at

We also have a phone line open for voicemail: +1(931) CYPH INC.


There's nothing in your cart. What are you even doing here?

To add something to your cart go to Business Pricing or make a donation .
Thank you for supporting Cyph!
Payment confirmed! Follow-up instructions will be sent via email.

Frequently Asked Questions

How do I use Cyph?

Simply go to or click the "start new cyph" button and a cyph link will be generated for you to send to a friend. Text, email, or send the link to them via any other channel, and when they click it you both will enter a secure chat.

How do I send photos?

Click the castle icon in the message composition textbox, click the photo icon, and then select the photo you wish to share.

How do I send files?

Click the castle icon in the message composition textbox, click the paperclip icon, and then select the file you wish to share. Note: sending and reveiving files requires a WebRTC-compatible browser. We recommend Chrome or Firefox.

How do I start a video or voice call?

Click the castle icon in the message composition textbox, then click the video (or phone) icon. A warning will pop up confirming that you wish to send the call invite and that connecting will expose your IP (Cyph video uses a peer-to-peer connection for voice and video, so you will be connecting directly to the other party instead of going through our servers).

What data do you track?

Currently, we only track numbers of: cyph sessions, messages, timeouts, voice/video calls, file transfers, signups, "cyphertext" UI views, and calls to our API.

How much does Cyph cost?

The Cyph beta is free to use for individuals (we intend to always have a free tier, because we see online privacy as a basic right) and we are currently piloting enterprise deployments of secure video and instant messaging.

Do you have an Android/iOS/TI-89 app?

Native chat applications for Android and iOS are in the works. We have no plans to support any Texas Instruments machines.

Why do I keep getting the "I'm sorry, but your cyph is in another castle" screen?

Common reasons for landing on this page are: the cyph URL has been opened more than once (only the first person who clicks it is allowed into the chat) or the cyph link has already expired.

Has there been a third-party security audit of Cyph?

Yes, Cure53 recently completed their audit of Cyph and concluded that "No major issues in regards to application security or cryptographic implementations could be spotted in spite of a thorough audit." [Complete Cure53 Pentest Report] A postmortem analysis will be posted on our blog soon.

How can I support Cyph?

One of the best ways you can support Cyph is by using it with your friends and talking about us on social media. You can also give feedback or donate to the cause. All donations will go towards the development and growth of Cyph.

What should I do if I encounter a bug?

Please contact us at; our team generally has pretty fast response time. If you can, please include any steps to reproduce or other relevant information.

Terms of Service

  1. Terms

    By accessing this website, you are agreeing to be bound by these website Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this website are protected by applicable copyright and trade mark law.

  2. Use License
    1. Permission is granted to temporarily download one copy of the materials (information or software) on Cyph's website for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:

      1. modify or copy the materials;
      2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
      3. attempt to decompile or reverse engineer any software contained on Cyph's website;
      4. remove any copyright or other proprietary notations from the materials; or
      5. transfer the materials to another person or "mirror" the materials on any other server.
    2. This license shall automatically terminate if you violate any of these restrictions and may be terminated by Cyph at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
  3. Refund Policy

    Unless a specific exception is made by Cyph, refunds will not be granted on any payments made to Cyph.

  4. Disclaimer

    The materials on Cyph's website are provided "as is". Cyph makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Cyph does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet website or otherwise relating to such materials or on any sites linked to this site.

  5. Limitations

    In no event shall Cyph or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Cyph's Internet site, even if Cyph or a Cyph authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

  6. Revisions and Errata

    The materials appearing on Cyph's website could include technical, typographical, or photographic errors. Cyph does not warrant that any of the materials on its website are accurate, complete, or current. Cyph may make changes to the materials contained on its website at any time without notice. Cyph does not, however, make any commitment to update the materials.

  7. Links

    Cyph has not reviewed all of the sites linked to its Internet website and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Cyph of the site. Use of any such linked website is at the user's own risk.

  8. Site Terms of Use Modifications

    Cyph may revise these terms of use for its website at any time without notice. By using this website you are agreeing to be bound by the then current version of these Terms and Conditions of Use.

  9. Governing Law

    Any claim relating to Cyph's website shall be governed by the laws of the State of VA without regard to its conflict of law provisions.

Privacy Policy

Privacy is what Cyph is all about, so your privacy is very important to us! Accordingly, we have developed this Policy in order for you to understand how we collect, use, communicate and disclose and make use of personal information. The following outlines our privacy policy.

  • Before or at the time of collecting any personal information, we will identify the purposes for which information is being collected.
  • We will collect and use of personal information only when necessary, solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
  • We will only retain personal information as long as necessary for the fulfillment of those purposes.
  • We will protect personal information by security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
  • We collect and use limited data with Google Analytics on our corporate site (, as well as in a sandboxed iframe for (the Cyph application), which then self-destructs after 10 seconds. Our backend logs the total number cyphs started, number of messages sent, beta-list sign-ups, and incoming requests.
  • We do not and will never view, log, or transfer plaintext versions of your encrypted data, nor the private keys and mutually shared secrets needed in order to decipher them.
  • We have not been approached by any agency, government or otherwise, with a request to backdoor our code. We are currently working on implementing a better warrant canary system.

We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.

If you have any questions about our policy, please email us at