Start new cyph
Talk Without Barriers
A beautiful, surveillance-free chat experience.

End-to-end encryption

Encrypted and authenticated via OTR and the Socialist Millionaire Protocol.

To crack a single Cyph message would take longer than the age of the universe — even using the fastest supercomputer on Earth.

Voice and video calling

Encrypted and authenticated via WebRTC and DTLS-SRTP.

Send files and images

Your photos are safe, and that's a great feeling. You won't have to worry about "The Cyphoning".

Anonymity through Tor

Want to hide that you're cyphing at all?

Just install Tor Browser and navigate to https://cyphdbyhiddenbhs.onion ("cyph'd by hidden backbone host server").

Cryptographically signed

Application packages are verified at run-time against our personal public keys — so even if our servers get pwned, you won't.

Works anywhere

Cyph from your desktop, laptop, phone, or tablet!

About Cyph

The mission of Cyph is to free the world from mass surveillance and data-collection.

We make it ridiculously fast, easy, and fun for anyone to have a completely private conversation online.

Cyph is the only technology of its kind to make this possible in one click, with zero installation or registration or configuration, for anyone, on any device.

Before Cyph, any sane security professional would have told you that building a secure application on the Web was impossible. Thanks to a handful of cool innovations, we've turned that impossibility into reality — and finally made it not suck to stay secure.

No Signup Required

Click the button at the top of your screen to cyph right now!


About Cyph

Encryption is hard, but using it shouldn’t be. We believe everyone deserves privacy, not only security experts.

Cyph is a next-generation messenger app that makes privacy the new status quo.

With Cyph, never again will you need to ask someone else to install or configure or sign up for anything, when all you need is a one-off private discussion.

One click and you’re secure.

Our Team

Cyph was founded by two former SpaceX engineers, to create a future where everyone could have the privacy they deserve.

Ryan Lester
Baron Joshua Cyrus Boehm

We've been friends since we first met 17 years ago, and we've since spent a lot of time working together over the years — most recently for Elon Musk at a certain rocket factory in Hawthorne.

While the two of us are very strong supporters of Internet freedom and privacy, communicating online securely with our non-engineer friends has always been such a hassle that it really wasn't an option.

We knew there had to be a better way, so we created Cyph.

I'm sorry, but your cyph is in another castle...

Reasons why you may have landed here:

  • A glitch in the matrix
  • You're just guessing random URLs
  • We broke something
Frequently Asked Questions
  • Dear Cyph, what's coming soon?

    Threat model, design specs / how it works, and a FAQ page with more than one question. Stay tuned!

Terms of Service
  1. Terms

    By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this web site are protected by applicable copyright and trade mark law.

  2. Use License
    1. Permission is granted to temporarily download one copy of the materials (information or software) on Cyph's web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:

      1. modify or copy the materials;
      2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
      3. attempt to decompile or reverse engineer any software contained on Cyph's web site;
      4. remove any copyright or other proprietary notations from the materials; or
      5. transfer the materials to another person or "mirror" the materials on any other server.
    2. This license shall automatically terminate if you violate any of these restrictions and may be terminated by Cyph at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
  3. Disclaimer

    The materials on Cyph's web site are provided "as is". Cyph makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Cyph does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.

  4. Limitations

    In no event shall Cyph or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Cyph's Internet site, even if Cyph or a Cyph authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

  5. Revisions and Errata

    The materials appearing on Cyph's web site could include technical, typographical, or photographic errors. Cyph does not warrant that any of the materials on its web site are accurate, complete, or current. Cyph may make changes to the materials contained on its web site at any time without notice. Cyph does not, however, make any commitment to update the materials.

  6. Links

    Cyph has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Cyph of the site. Use of any such linked web site is at the user's own risk.

  7. Site Terms of Use Modifications

    Cyph may revise these terms of use for its web site at any time without notice. By using this web site you are agreeing to be bound by the then current version of these Terms and Conditions of Use.

  8. Governing Law

    Any claim relating to Cyph's web site shall be governed by the laws of the State of VA without regard to its conflict of law provisions.

Privacy Policy

Privacy is what Cyph is all about, so your privacy is very important to us! Accordingly, we have developed this Policy in order for you to understand how we collect, use, communicate and disclose and make use of personal information. The following outlines our privacy policy.

  • Before or at the time of collecting any personal information, we will identify the purposes for which information is being collected.
  • We will collect and use of personal information only when necessary, solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
  • We will only retain personal information as long as necessary for the fulfillment of those purposes.
  • We will protect personal information by security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
  • We collect and use limited data with Google Analytics on our corporate site (cyph.com), as well as in a sandboxed iframe for cyph.im (the Cyph application), which then self-destructs after 10 seconds. Our backend logs the total number cyphs started, number of messages sent, beta-list sign-ups, and incoming requests.
  • We do not and will never view, log, or transfer plaintext versions of your encrypted data, nor the private keys and mutually shared secrets needed in order to decipher them.
  • We have not been approached by any agency, government or otherwise, with a request to backdoor our code. We are currently working on implementing a better warrant canary system.

We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.

If you have any questions about our policy, please email us at privacy@cyph.com.