Your messages.
Your device.
Mathematically proven.

Device-to-device encrypted messaging with cryptographic proof of conversation integrity. No server storage. No recovery. No compromise.

App Store Soon Google Play Soon
AES-256· WebRTC P2P· QR Contact Exchange· Hash Chains· Merkle Proofs
Ages 18+ · $4.99/year or $29.99 lifetime

Three layers. Zero compromise.

Encrypted on your device

AES-256 encryption runs locally via an immutable binary. Keys generated on device, stored on device. Never transmitted, never shared with any server.

Sent device to device

Messages travel directly between devices via WebRTC peer-to-peer channels. No server receives, stores, or relays your message content. Contacts are exchanged via QR code only — no search, no directory, no phone number matching.

Verified mathematically

Cryptographic hash chains and Merkle proofs create tamper-proof records. Every 50 messages, integrity is verified automatically. Any alteration triggers an immediate alert.

Security without compromise.

Compliance without compromise.

Your team's conversations are protected by mathematics, not policies. Trade secrets, client communications, strategic discussions — encrypted on device, verified by hash chains, invisible to any server.

Zero server liability — nothing to breach because we hold nothing
Tamper-proof audit trail — cryptographic hash chains prove conversation integrity
GDPR / HIPAA friendly — we hold no patient or client data to regulate
Self-host option — run your own auth server for complete infrastructure control
What your IT team hears

"Messages are AES-256 encrypted on device with keys that never leave the device."

"The server only stores email, username, and public key. Two database tables. No message table exists."

"No user directory. Contacts exchange via QR code only."

"Hash chain verification provides a mathematical audit trail without exposing content."

Zero-trust communications.

Chain of custody built into every message. Five independently auditable binaries. No back doors, no recovery mechanisms, no server-side exposure. Nothing to subpoena because nothing exists to subpoena.

Chain of custody — every message mathematically linked via hash chains and Merkle proofs
Five auditable binaries — immutable Go executables, independently verifiable
Self-host everything — run auth on your own infrastructure, air-gapped if needed
No recovery by design — we cannot access your data, even under legal order
Security posture

"Device-to-device via WebRTC. No message relay server."

"No user directory. QR code contact exchange only."

"Tamper detection triggers on any hash chain inconsistency."

"Lost device without user-managed backup = unrecoverable. By design."

Private messaging that means it.

Your conversations go directly from your device to theirs. No server reads, stores, or routes your messages. If someone takes over an account, mathematical verification catches it. Your data stays yours — literally.

Journalists — protect your sources with mathematical proof of authenticity
Lawyers — privileged communications that are actually privileged
Activists — no server to raid, no data to seize, no logs to subpoena
Everyone — your conversations are nobody else's business
The simple version

"Your messages go directly from your phone to their phone."

"No company — not even us — can read what you say."

"No one can message you unless you share your QR code with them."

"If someone hijacks an account, math catches it."

"Back up your data or don't. We never have a copy."

What the server knows.

Server stores
Your email
Your username
Your public key
Two database tables. No message table exists.
No user search. No directory. QR code only.
Open source. Self-hostable.
Server never sees
Your messages (encrypted or otherwise)
Encryption keys or nonces
Hash chains or Merkle proofs
Vault data or backups
Conversation metadata or logs
Lost device without backup = lost data.
That's not a bug. That's the promise.

Five binaries. All on your device.

🔒
LayerOneL
AES-256 Encryption
⛓️
ledger-memo
Hash Chain Ledger
🌳
MerkleProof
Merkle Tree Proofs
📨
texrr-messenger
Message Queue
🛡️
verify-user
Chain Verification
Immutable Go executables. Stateless — each invocation starts, processes, returns JSON, exits.
Independently auditable. Runs entirely on your device.

Four looks. One principle.

Choose how your messenger feels. Security doesn't change.

Midnight
Technical
Clean
Professional
Neon Synth
Cyberpunk
Meadow
Calm

Texrr cannot read your messages.

Texrr cannot recover your data.

Texrr cannot hand over what we don't have.

Back up your vault. We won't remind you twice.

Get Texrr.

Your device. Your data. Mathematically proven.

App Store Soon Google Play Soon
Ages 18+ · $4.99/year or $29.99 lifetime · Self-host available