Privacy isn't a feature.
It's the architecture.

Zero-knowledge messaging with Signal Protocol — encrypted end-to-end, self-hostable, open source.

Most encrypted apps still have a single point of trust: their servers. Start your private server, even on Raspberry Pi, or choose a trusted server.


The problem with "secure" messaging

Most apps call themselves secure. But security isn't just encryption — it's the architecture behind it.

Metadata

Who you talk to, when, how often. Even with encrypted content, this data reveals everything about you.

Centralization

A single company controls the infrastructure. Server compromise = total compromise.

Opaque servers

You can't verify what the server does. You must trust the vendor blindly.

The TilliT approach

TilliT doesn't ask you to trust. It's designed to be verifiable.

Zero-knowledge

The server never sees your messages. Even in RAM. True end-to-end with verifiable implementation.

Signal Protocol

Double Ratchet + X3DH for perfect forward secrecy. Post-quantum Kyber keys for future-proof protection.

Your infrastructure

Start your server in 5 minutes, use one run by someone you trust or choose a public server. The security model remains the same.

TilliT Icon

How it works

Three steps to complete control of your communications.

  1. 1

    Choose your infrastructure

    Start your own in minutes, or use a trusted server. Even a Raspberry Pi is enough.

  2. 2

    Connect from the app

    Connect the app to your chosen server and start communicating with end-to-end encryption.

  3. 3

    Communicate securely

    Manage your infrastructure or use someone else's: the app stays simple for everyone.

Security: Real End-to-End Encryption

All messages are protected with Signal Protocol: only participants' devices can read the content. The server transports but can't access messages.

Keys stay on device

Private keys are stored securely on iOS (Keychain) and Android (Keystore). No server can access them.

Signal Protocol for every chat

End-to-end encryption protects messages, media, and files. Only participants can read.

Server can't read

The server is just a bridge: it can't access content or keys.

Who is TilliT for?

TilliT is for anyone who wants to communicate securely with complete control over infrastructure.

Sensitive organizations

Journalists, activists, professionals, NGOs. When privacy isn't optional but an operational requirement. Native Tor support.

Communities

An independent, self-managed space with invites and private rooms. The network grows by adding servers, not by centralization.

Teams & Businesses

Internal communications under total control. Decide where data lives, who administers the infrastructure, and which policies apply.

Families

A private server at home to communicate only with your loved ones. No data on external servers. No company tracking your conversations.

Get Started: download the app

Download TilliT and connect to your private server.

Get Started: choose your server

Start your private server in minutes, or use an existing server (for example the official one) or rely on a trusted server managed by a person or group you know.

If you want maximum control, you can also create your own private server.

  1. 1

    Choose the mode

    Decide whether to start your own server or use a trusted server.

  2. 2

    Connect and create a room

    Open a room and invite people with unique codes.

  3. 3

    Chat (E2E by default)

    Messages and media are protected by the same end‑to‑end encryption.

Option 1: trusted server

Ideal for family, friends, small teams. You connect and start chatting: privacy remains end‑to‑end.

Option 2: your own server

For organizations and advanced users. You govern access, policies, management, and operational context.

Frequently Asked Questions

What does "zero-knowledge" mean?
Zero-knowledge means the server has no access to your messages. It doesn't see them, read them, or store them in plaintext. The server transports end-to-end encrypted data that only participants' devices can decrypt.
Can the server I use read my messages?
No. TilliT uses Signal Protocol with end-to-end encryption. Message content never passes in plaintext. Even if you run the server yourself, you can't read other users' messages.
How hard is it to host a server?
TilliT runs on a Raspberry Pi with less than 100MB RAM. Just a Docker container and a few minutes. You can choose from 4 modes: Tor Hidden Service, Cloudflare Tunnel, public HTTPS, or local HTTP.
Why not just use Signal?
Signal is great, but centralized. You must trust their servers. With TilliT you can choose who to trust — or trust no one and run everything yourself. Same encryption, more control.
What about post-quantum encryption?
TilliT supports Kyber keys to protect communications from future quantum computers. It's an extra layer of security for those planning long-term.

Start now. Zero trust required.

Download the app, launch your own in minutes — or connect to a trusted server.