Registry Status
As the digital landscape shifts toward mandatory data collection and linked digital IDs, the fundamental right to a private conversation is quietly disappearing. I realized people are urgently seeking a way to communicate without being cataloged.
Most companies tell you your messages are "End-to-End Encrypted" like it's a magic spell. But they are lying by omission. They might not read the specific words of your message, but they capture the Metadata.
Metadata is the story of your life. It is the "Who", the "When", and the "Where". If a platform maps your social graph, logs your IP address, and ties it to your phone number, the actual content of your message is largely irrelevant. The surveillance is already complete.
1. System Entry
You cannot regulate away surveillance, and you cannot ask a corporation to ignore profit. My solution was to build technology where metadata collection is physically impossible. Here are the first rules of the realm:
Absolute Anonymity
I don't want your phone number, and I don't need your email. Your identity is just a mathematical key pair generated locally on your device. You aren't a customer record in a database. You are just a ghost in the machine.
The Blind Relay
Most servers are like a postman who logs who you're writing to. My relay acts like a casino floor covered in thick fog. It passes sealed envelopes (secured by ML-KEM and ML-DSA) without ever knowing what's inside, or who is holding the keys.
2. Entropy Override
Data Entropy
Data doesn't just sit on my relays waiting to be looted. It decays. Mailboxes have strict Time-To-Live limits. Once delivered, messages are physically annihilated from memory using multi-pass overwrites.
Sovereign Hosting
I physically host the primary consumer relays in Germany and Finland to ensure rigorous European data sovereignty and privacy standards. Every everyday user on Visk chats behind this heavily fortified, localized shield.
3. Multi-Sig Approval
The Skuld Consensus
I removed the "Super User" god-mode. Critical operational changes to the relay infrastructure require multi-signature cryptographic consensus. Even if I were coerced, the system mathematically refuses to obey a single admin.
4. Emergency Halt
Total Dissolution
Triggering Gondul doesn't just turn the server off. It initiates a scorched-earth protocol. It shreds the master encryption keys, overwrites the memory with garbage data, and wipes the identity files from the disk. By the time they plug the hard drive into their forensics machine, the Visk relay is gone. It's just a brick.
Execute Test Suite to Decrypt
The consumer Web Chat is currently in closed beta and available exclusively to my Visk Ops enterprise clients. While an early compiled Windows build exists, it is highly experimental.
I am a solo developer, and I pour my heart into this project, which means timelines sometimes adapt to ensure the quality is absolute. I've spent the last eight years building this encryption stack from the ground up: evolving from early payload hardening, through rigorously implemented post-quantum cryptography, advancing to my experimental Aetherion layer, and culminating in the VPQ5 container for zero-knowledge data transport.
With the internet feeling more and more like a place where every click is tracked, I just wanted to build a quiet, safe space for you and your crew to hang out. In an era where corporate data breaches happen constantly, Visk solves the problem at the root: A leak of your personal identity is practically impossible here, simply because the app is designed to never collect it in the first place.
Explore the Tech Timeline