Self-hosted Texrr on your infrastructure. Air-gapped deployment. Bulk QR provisioning. No data ever leaves your network. Nothing to subpoena, nothing to breach, nothing to compromise.
The consumer app uses Texrr-hosted Supabase for auth and signaling. Enterprise replaces that with your own servers. The cryptography, binaries, and P2P messaging are identical.
Deploy on your cloud provider. AWS, Azure, GCP, or any infrastructure you control. Full Supabase stack, signaling server, and STUN/TURN on your VPC.
Run everything on physical hardware in your data centre. No external network dependencies for auth, signaling, or NAT traversal. Complete physical control.
Fully isolated network. No internet connection. Auth, signaling, and TURN all run on internal infrastructure. Devices communicate via internal network WebRTC only.
Generate QR codes for your entire team from an admin console. Pre-configure contact groups so employees can message each other from day one without manual scanning.
User provisioning, deactivation, and public key management. View verification status across your organisation. No message content is ever visible — admin controls account-level operations only.
Distribute the Texrr app via Mobile Device Management — Jamf, Intune, Workspace ONE, or your MDM of choice. Pre-configure server endpoints and push binaries alongside the app.
Pre-configure inbox tabs for your organisation — Ops, Legal, Executive, Field — whatever fits your structure. Users see messages sorted by category from the start.
Export hash chain verification summaries for compliance. Reports confirm that cryptographic integrity checks passed across your user base — without exposing any message content.
Dedicated support engineer. Guaranteed response times. Deployment assistance, infrastructure review, and ongoing consultation. Priority issue resolution.
Classified communications on air-gapped networks. Chain of custody via hash chains. Zero external data exposure. USB-distributed binaries for secure environments.
HIPAA-aligned messaging — no patient data on any server. Clinician-to-clinician device-to-device communication. Verification flags catch account compromise before sensitive information is exposed.
Attorney-client privilege that's actually enforced by cryptography. Trade secrets that exist only on the devices of participants. Hash chain audit trails for compliance without content exposure.
Board-level discussions that never pass through a server. M&A negotiations, strategic planning, competitive intelligence — each message individually encrypted and delivered P2P. No persistent threads to leak.
We hold email, username, and public key. No message data to regulate. Account deletion removes all server-side data. Data processing agreement available.
No protected health information on any server. Device-to-device transmission with AES-256 encryption. Self-hosted deployment eliminates BAA requirements for message content — there is no message content to cover.
Self-hosted deployment means your SOC 2 scope covers your infrastructure, not ours. The attack surface is two database columns and a public key. Audit the five Go binaries independently.
Consumer: we produce email, username, public key. That's everything we have. Enterprise self-hosted: the subpoena goes to you, and you hold email, username, public key. Message content does not exist on any server.
Full encryption and P2P messaging
Hash chain verification
QR contact exchange
4 themes
Email support
Everything in Consumer, plus:
Self-hosted infrastructure
Bulk QR provisioning
Admin dashboard
MDM distribution
Verification reports
Custom inbox categories
Dedicated support with SLA
Deployment assistance
Tell us about your organisation, deployment requirements, and user count. We'll schedule a technical walkthrough and provide a tailored proposal.