Industry-leading encryption to protect your conversations
Sleutl uses the Signal Protocol - the same encryption trusted by journalists, activists, and security experts worldwide. We cannot read your messages, and neither can anyone else.
Every message is encrypted before it leaves your device. The encryption keys exist only on your device and the recipient's device - never on our servers.
Each message uses unique encryption keys. Even if one key is compromised, it cannot decrypt past or future messages - each conversation starts fresh.
We use the Signal Protocol (X3DH + Double Ratchet) - the gold standard in secure messaging, independently audited and used by billions worldwide.
We're designed so we cannot read your messages even if we wanted to. No backdoors, no master keys - mathematical privacy you can verify.
A step-by-step look at how your messages are protected
When you create an account, your device generates multiple cryptographic key pairs: an identity key (long-term), signed prekeys, and one-time prekeys. Your private keys never leave your device.
When you start a conversation, the Extended Triple Diffie-Hellman protocol establishes a shared secret. This happens without either party needing to be online simultaneously, using prekeys uploaded to our server.
Once a session is established, the Double Ratchet algorithm derives new encryption keys for each message. This provides forward secrecy and break-in recovery - compromising one key doesn't affect others.
Your message is encrypted using AES-256 with the current session key, authenticated with HMAC-SHA256. The encrypted payload is sent to our server, which delivers it without being able to read it.
Only the recipient's device has the keys to decrypt the message. After decryption, the session ratchets forward, ensuring each message has unique encryption.
Security isn't just about encryption - it's about protecting all aspects of your data
All connections use TLS 1.3 with strong cipher suites. Certificate pinning prevents man-in-the-middle attacks.
Personal data (email, phone) is encrypted at rest using AES-256. Even database breaches don't expose your information.
Passwords are hashed using bcrypt with high work factors. JWT tokens are short-lived and securely signed.
We minimize metadata collection. We don't log IP addresses, timestamps of messages, or communication patterns.
Encryption keys are stored in your browser's secure storage (IndexedDB with encryption). They never leave your device.
Set messages to auto-delete. Once expired, they're permanently removed from both devices and our servers.
See how Sleutl compares to other messaging platforms
| Feature | Sleutl | Telegram | iMessage | |
|---|---|---|---|---|
| E2E Encryption by Default | ✓ | ✓ | ✗ | ✓ |
| Signal Protocol | ✓ | ✓ | ✗ | ✗ |
| Perfect Forward Secrecy | ✓ | ✓ | Partial | ✗ |
| No Metadata Collection | ✓ | ✗ | ✗ | ✗ |
| Encrypted Group Chats | ✓ | ✓ | ✗ | ✓ |
| Disappearing Messages | ✓ | ✓ | ✓ | ✗ |
| No Phone Number Required | ✓ | ✗ | ✗ | ✗ |
| Independent from Big Tech | ✓ | ✗ | ✓ | ✗ |
We take security seriously. If you discover a vulnerability, please report it responsibly.
security@sleutl.comStart using Sleutl today and communicate with confidence.