Even if you're not doing anything wrong, you are being watched and recorded
Cryptography is the essential building block of independence for organisations on the Internet, just like armies are the essential building blocks of states
Anything out there is vulnerable to attack given enough time and resources
Much more secure, reliable, accessible and cheaper than ever. Have a look at use-cases and connect to your service.
We want every small group own their private blockchain—Free license · Easier, than others · Private token · Messenger and crypto wallet · You own data and messages.
ADAMANT | TELEGRAM | FB MESSENGER | CONNECT.IM | SIGNAL | DUST | RING | BITMESSAGE | OBSIDIAN | CRYPVISER | ||
---|---|---|---|---|---|---|---|---|---|---|---|
Open Source Code for server, application and protocol parts | yes | no | Partly closed | no | Partly closed | yes | no | yes | yes | no | no |
No centralised storage for any part of the User Data | All User Data is stored in the Blockchain (decentralised) | Operator stores Data of all conversations including images, video and files | Operator stores all Data, except "Secret" chats | Operator stores Data of all conversations including images, video and files | Peer-to-peer, but there are intermediate servers which store undelivered messages | Operator is able to log all Data on servers | All Data is Stored and Viewed by the operator | Peer-to-peer, but there are intermediate servers which store undelivered messages | Yes. All data is stored distributed on nodes (2 days) | Peer-to-peer, but there are intermediate servers for storing undelivered messages | Peer-to-peer, but there are intermediate servers for storing undelivered messages |
Developers / Provider is NOT able to block user account | yes | is Able / Blocking | is Able / Blocking | is Able / Blocking | Is Able | Is Able | is Able / Blocking | Is Able | yes | Is Able (current time) | Is Able |
No explicit user identification | yes | Mobile number is used for authorization | Mobile number is used for authorization | Mobile number of Facebook account is used for authorization | Mobile number is used for authorization | Mobile number is used for authorization | Mobile number of Facebook account is used for authorization | User account creation in the Ring Network | yes | yes | Identification by IP, login, bank data, device |
End-to-end encryption (with inability for developers to read user messages) | yes | There is a potential ability for operator to read all messages | There is a potential ability for operator to read all messages | There is a potential ability for operator to read all messages | yes | yes | There is a potential ability for operator to read all messages | yes | yes | Declared, but potentially there is the possibility of reading by the developer | There is a potential ability for operator to read all messages |
No access to address book | yes | Asks user for access | Asks user for access | Asks user for access | Asks user for access | Asks user for access | Asks user for access | Asks user for access | yes | yes | yes |
No access to user location | yes | Asks user for access | Asks user for access | Asks user for access | Asks user for access | yes | Asks user for access | yes | yes | yes | yes |
Does NOT transfer user Private Keys over the network | yes | Source Code is closed for Review | Source Code is closed for Review | Source Code is closed for Review | Stored encrypted on operator’s servers | yes | Source Code is closed for Review | yes | yes | Unknown (no source code) | Source Code is closed for Review |
Does NOT store message history or any other usage information on the user device | yes | is Storing | is Storing | is Storing | is Storing | is Storing | Is able to delete messages from both end-users’ devices | is Storing | yes | Unknown (no source code) | is Storing |
Does NOT disclosure or expose user IP-address | yes | Exposed to Operator | Exposed to Operator | Exposed to Operator | Exposed to Operator | Exposed to Operator | Exposed to Operator | Directly interacts with Ring Network | yes | Exposed to Operator (current time) | Exposed to Operator |
Not able to get statuses like «Message Read» or "User Online" | yes | All Notifications are Enabled by default | You can hide only the "Last Seen" Status | You can only switch the "Active" Status | yes | Asks for user Permission | Forced "Message Read" notifications. No Status for user Availability | yes | yes | Forced "Message Read" notifications. No Status for user Availability | Asks for user Permission |
Does not request access to the microphone | yes | Optional | Optional | Optional | yes | Optional | yes | Required | yes | yes | Required |
Usage cost | 0.001 ADM (0.00024 USD) per message | Privacy of yourself and your interlocutors | Your ID, at least | Privacy of yourself and your interlocutors | Your ID, at least | Your ID, at least | Privacy of yourself and your interlocutors | Free | PoW, energy cost | Unknown (no source code) | Your privacy and your interlocutors + 43 EUR per year |
Spam protection | Paid messages, White and Black lists | Centralized | Centralized | Centralized | Centralized | Centralized | Centralized | No public addresses | PoW, energy cost | No public addresses | Not known |
Delivery of messages | 0–2 seconds | Less than a second | Less than a second | Less than a second | Less than a second | Less than a second | Less than a second | Less than a second. Messeges can be sent only when the recepient is online. | Up to 4 minutes | Less than a second (current time) | Less than a second |
Availability of mobile applications | yes | yes | yes | yes | yes | yes | yes | yes | No, because of PoW | yes | yes |
ADAMANT | TELEGRAM | FB MESSENGER | CONNECT.IM | SIGNAL | DUST | RING | BITMESSAGE | OBSIDIAN | CRYPVISER |