Privacy isn't a feature.
It's the architecture.
Zero-knowledge messaging with Signal Protocol — encrypted end-to-end, self-hostable, open source.
Most encrypted apps still have a single point of trust: their servers. Start your private server, even on Raspberry Pi, or choose a trusted server.
The problem with "secure" messaging
Most apps call themselves secure. But security isn't just encryption — it's the architecture behind it.
Metadata
Who you talk to, when, how often. Even with encrypted content, this data reveals everything about you.
Centralization
A single company controls the infrastructure. Server compromise = total compromise.
Opaque servers
You can't verify what the server does. You must trust the vendor blindly.
The TilliT approach
TilliT doesn't ask you to trust. It's designed to be verifiable.
Zero-knowledge
The server never sees your messages. Even in RAM. True end-to-end with verifiable implementation.
Signal Protocol
Double Ratchet + X3DH for perfect forward secrecy. Post-quantum Kyber keys for future-proof protection.
Your infrastructure
Start your server in 5 minutes, use one run by someone you trust or choose a public server. The security model remains the same.
How it works
Three steps to complete control of your communications.
-
1
Choose your infrastructure
Start your own in minutes, or use a trusted server. Even a Raspberry Pi is enough.
-
2
Connect from the app
Connect the app to your chosen server and start communicating with end-to-end encryption.
-
3
Communicate securely
Manage your infrastructure or use someone else's: the app stays simple for everyone.
Security: Real End-to-End Encryption
All messages are protected with Signal Protocol: only participants' devices can read the content. The server transports but can't access messages.
Keys stay on device
Private keys are stored securely on iOS (Keychain) and Android (Keystore). No server can access them.
Signal Protocol for every chat
End-to-end encryption protects messages, media, and files. Only participants can read.
Server can't read
The server is just a bridge: it can't access content or keys.
Who is TilliT for?
TilliT is for anyone who wants to communicate securely with complete control over infrastructure.
Sensitive organizations
Journalists, activists, professionals, NGOs. When privacy isn't optional but an operational requirement. Native Tor support.
Communities
An independent, self-managed space with invites and private rooms. The network grows by adding servers, not by centralization.
Teams & Businesses
Internal communications under total control. Decide where data lives, who administers the infrastructure, and which policies apply.
Families
A private server at home to communicate only with your loved ones. No data on external servers. No company tracking your conversations.
Get Started: download the app
Download TilliT and connect to your private server.
Get Started: choose your server
Start your private server in minutes, or use an existing server (for example the official one) or rely on a trusted server managed by a person or group you know.
If you want maximum control, you can also create your own private server.
-
1
Choose the mode
Decide whether to start your own server or use a trusted server.
-
2
Connect and create a room
Open a room and invite people with unique codes.
-
3
Chat (E2E by default)
Messages and media are protected by the same end‑to‑end encryption.
Option 1: trusted server
Ideal for family, friends, small teams. You connect and start chatting: privacy remains end‑to‑end.
Option 2: your own server
For organizations and advanced users. You govern access, policies, management, and operational context.
Frequently Asked Questions
What does "zero-knowledge" mean?
Can the server I use read my messages?
How hard is it to host a server?
Why not just use Signal?
What about post-quantum encryption?
Start now. Zero trust required.
Download the app, launch your own in minutes — or connect to a trusted server.