Start new cyph
Start a private conversation with
anyone, in 30 seconds

Military-grade encryption

To crack a single Cyph message would take longer than the age of the universe.

(That's even if you had the fastest supercomputer on Earth.)

Authenticated messaging

With Cyph, you can be sure you're talking to whom you think you're talking to, thanks to the Socialist Millionaire Protocol.

Send photos

Your photos are safe, and that's a great feeling. You don't have to worry about "The Cyphoning".

Coming Soon

Voice and video calling

Photos are one thing, but it would suck to have these leaked.

Send cash

Through the awesome power of Bitcoin, you can cyph anyone a quid privately and securely.

Cyph anonymously with Tor

Need to hide the fact that you're even using Cyph? Good news! We're getting ready to roll out our very own Onion site!

No Registration Required

Click the button at the top of your screen to cyph right now!

Why Cyph?

Encryption is hard, but using it shouldn’t be. We believe everyone deserves privacy, not only security experts.

Cyph is a next-generation messenger app that makes privacy the new status quo.

With Cyph, never again will you need to ask someone else to install or configure or sign up for anything, when all you need is a one-off private discussion.

One click and you’re secure.

About Cyph

Encryption is hard, but using it shouldn’t be. We believe everyone deserves privacy, not only security experts.

Cyph is a next-generation messenger app that makes privacy the new status quo.

With Cyph, never again will you need to ask someone else to install or configure or sign up for anything, when all you need is a one-off private discussion.

One click and you’re secure.

Our Story

Cyph was founded by two former SpaceX engineers to meet their own high standards of what chat should be: completely private and delightfully dope.

Ryan Lester
Baron Joshua Cyrus Boehm

We've been friends since we first met 17 years ago, and we've since spent a lot of time working together over the years – most recently for Elon Musk on a small team at SpaceX.

The two of us have always been pretty big on keeping private things private, which turns out not to be a trivial goal. Even ignoring government surveillance, the issue is fundamentally the same: sending data openly through the Internet involves trusting a lot of random strangers.

Over time, we'd variously used PGP, Pidgin OTR, and a number of different encrypted chat services; and never been quite satisfied.

We knew there had to be a better way, that a future where everyone could have privacy was possible.

So, we created Cyph.

I'm sorry, but your cyph is in another castle...

Reasons why you may have landed here:

  • A glitch in the matrix
  • You're just guessing random URLs
  • We broke something
Frequently Asked Questions
  • Dear Cyph, what's coming soon?

    Threat model, design specs / how it works, and a FAQ page with more than one question. Stay tuned!

Terms of Service
  1. Terms

    By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this web site are protected by applicable copyright and trade mark law.

  2. Use License
    1. Permission is granted to temporarily download one copy of the materials (information or software) on Cyph's web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:

      1. modify or copy the materials;
      2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
      3. attempt to decompile or reverse engineer any software contained on Cyph's web site;
      4. remove any copyright or other proprietary notations from the materials; or
      5. transfer the materials to another person or "mirror" the materials on any other server.
    2. This license shall automatically terminate if you violate any of these restrictions and may be terminated by Cyph at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
  3. Disclaimer

    The materials on Cyph's web site are provided "as is". Cyph makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Cyph does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.

  4. Limitations

    In no event shall Cyph or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Cyph's Internet site, even if Cyph or a Cyph authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

  5. Revisions and Errata

    The materials appearing on Cyph's web site could include technical, typographical, or photographic errors. Cyph does not warrant that any of the materials on its web site are accurate, complete, or current. Cyph may make changes to the materials contained on its web site at any time without notice. Cyph does not, however, make any commitment to update the materials.

  6. Links

    Cyph has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Cyph of the site. Use of any such linked web site is at the user's own risk.

  7. Site Terms of Use Modifications

    Cyph may revise these terms of use for its web site at any time without notice. By using this web site you are agreeing to be bound by the then current version of these Terms and Conditions of Use.

  8. Governing Law

    Any claim relating to Cyph's web site shall be governed by the laws of the State of VA without regard to its conflict of law provisions.

Privacy Policy

Privacy is what Cyph is all about, so your privacy is very important to us! Accordingly, we have developed this Policy in order for you to understand how we collect, use, communicate and disclose and make use of personal information. The following outlines our privacy policy.

  • Before or at the time of collecting any personal information, we will identify the purposes for which information is being collected.
  • We will collect and use of personal information only when necessary, solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
  • We will only retain personal information as long as necessary for the fulfillment of those purposes.
  • We will protect personal information by security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
  • We collect and use limited data with Google Analytics on our corporate site (, as well as in a sandboxed iframe for (the Cyph application), which then self-destructs after 10 seconds. Our backend logs the total number cyphs started, number of messages sent, beta-list sign-ups, and incoming requests.
  • We do not and will never view, log, or transfer plaintext versions of your encrypted data, nor the private keys and mutually shared secrets needed in order to decipher them.
  • We have not been approached by any agency, government or otherwise, with a request to backdoor our code. We are currently working on implementing a better warrant canary system.

We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.

If you have any questions about our policy, please email us at