- Eliminate metadata. Nobody knows who you are, who you talk to, or what you say.
- Stay anonymous. Share what you want, without sharing your identity and location.
- Nobody in the middle. There are no servers to monitor, censor, or hack.
- Safe by default. Security isn’t secure until it’s automatic and easy to use.
-
How it works
Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address.
Instead of a username, you get a unique address that looks like
ricochet:rs7ce36jsj24ogfw
.
Other Ricochet users can use this address to send a contact request – asking to be added to your contacts list.You can see when your contacts are online, and send them messages (and soon, files!). Your list of contacts is only known to your computer – never exposed to servers or network traffic monitoring.
Everything is encrypted end-to-end, so only the intended recipient can decrypt it, and anonymized, so nobody knows where it’s going and where it came from.