Secure Transport Layer
Privacy is not a policy.
It is mathematics.
A zero-trust messaging protocol where the server is mathematically incapable of accessing message content. Strategically hosted in Hong Kong to ensure data sovereignty.
01 / Architecture
The Server is a
Blind Relay.
Traditional "secure" messengers act as trusted intermediaries. RChat removes trust from the equation entirely. The server sees nothing but opaque, encrypted bytes.
No decryption keys.
ciphertext = XChaCha20Poly1305(key=k_ratchet, msg=plaintext)
01 / Key Generation
Strictly On-Device.
Private keys are generated on user hardware and never transmitted. The server possesses no cryptographic capability to decrypt payloads.
02 / Metadata
Zero Retention.
RChat utilizes opaque circuit identifiers to route packets. We do not maintain social graphs, timestamps, or sender-receiver logs.
03 / Transport
TLS 1.3 Tunneling.
All protocol traffic is encapsulated within standard HTTPS (TLS 1.3) frames, rendering it indistinguishable from standard web browsing.
02 / Jurisdiction
Strategic Independence.
Hong Kong Hosting.
Cryptography is only as strong as the legal jurisdiction holding the hardware. RChat infrastructure is legally domiciled and physically hosted in Hong Kong, placing it strictly outside the jurisdiction of Western intelligence sharing agreements.
03 / Comparison
Verify the Difference.
| FEATURE | RCHAT | SIGNAL | TELEGRAM |
|---|---|---|---|
| Server Blind Relay | YES | NO | NO |
| Post-Quantum (Kyber768) | HYBRID | PARTIAL | NO |
| Jurisdiction | HONG KONG | USA (5 EYES) | UAE |
| Self-Hostable | YES | DIFFICULT | NO |
04 / Ownership
Don't Trust Us.
Run Your Own Node.
True security requires the ability to verify the infrastructure. RChat is 100% open source. You can audit the code and deploy your own relay node in minutes using Docker.
VIEW GITHUB REPOSITORY⠿ Network rchat_net Created
⠿ Container rchat-db Started
⠿ Container rchat-api Started