Documentation

Ekko Chat Overview

Understand how Ekko Chat works, why it exists, and the technology behind decentralized, encrypted messaging.

Why Ekko Chat Exists

Every mainstream messaging app — WhatsApp, Signal, iMessage, Telegram — relies on central servers operated by a single company. Even when messages are encrypted, the server still knows who you're talking to, when, and how often. If the company goes down, gets hacked, or is compelled by a government to hand over data, your communication is at risk.

Ekko Chat takes a fundamentally different approach: there is no server. Your messages travel through decentralized networks that no single entity controls. Your identity is a cryptographic key stored only on your device — not an email address, not a phone number, not a username tied to any service.

Who Ekko Chat is For

Journalists & Activists

Operating in environments where communication metadata can be dangerous

Privacy-Conscious Individuals

Who don't want their social graph harvested

Communities with Unreliable Internet

Where Bluetooth and mesh networking keep communication alive

Anyone Who Believes

Messaging infrastructure shouldn't depend on the goodwill of a corporation

How Messages Travel

Ekko Chat uses five different communication paths to deliver your messages. The app automatically selects the best available path.

1

Bluetooth (BLE)

When you're physically near someone (within about 30 feet), Ekko Chat sends messages directly over Bluetooth. No internet needed. This is the fastest path and works even if all networks are down.

Your phone quietly advertises its presence via Bluetooth. When a contact's phone is nearby, the two devices establish an encrypted tunnel and exchange messages instantly.

2

Internet (DHT)

When you're not nearby, Ekko Chat uses a global peer-to-peer network called a Distributed Hash Table — the same kind of network that powers BitTorrent.

Think of it like a public bulletin board where messages are written in a code only the intended recipient can read. The bulletin board is maintained by thousands of independent computers worldwide.

3

Onion Routing (Tor)

For maximum privacy, Ekko Chat establishes a direct connection through the Tor network. Messages bounce through multiple encrypted layers so neither party reveals their location.

Each device creates a hidden address that's only reachable through Tor. Messages travel through three layers of encryption across different countries.

4

Quick Relay (iroh)

Some networks block direct connections. Ekko Chat uses QUIC to punch through barriers and establish a direct peer-to-peer link.

Devices exchange small endpoint IDs through the decentralized network, then connect directly using a protocol faster and more reliable than traditional connections.

5

Mesh Relay (BLE Gossip)

After a normal Bluetooth exchange, devices share encrypted blobs meant for other people. Every Ekko Chat device acts as a potential courier.

The relay person can't decrypt messages and doesn't even know who the intended recipients are. This extends Ekko Chat's reach into areas with spotty connectivity.

Why Messages Take Longer Than WhatsApp

The latency is the privacy

The extra time isn't a bug — it's the natural consequence of removing the middleman. Every second of latency represents a layer of privacy protection.

No server logs your message timing

No company maps your relationships

No single point can be compromised or censored

Messages travel through independently operated networks

For nearby contacts, Bluetooth delivers messages faster than any centralized app. For distant contacts, the trade-off is seconds of latency in exchange for communication that no third party can monitor, block, or control.

Development Roadmap

DHT Subscription Service

Planned
  • Push notifications instead of polling
  • Extended message retention
  • Priority publishing for faster propagation
  • Larger payloads without chunking overhead

Relay Subscription Service

Planned
  • Dedicated high-availability relay infrastructure
  • Offline message queuing with E2E encryption
  • Faster delivery approaching centralized messenger speeds
  • Geographic distribution for low-latency connections

Pricing Philosophy

Free tier remains fully functional — all transports, all features
Subscriptions enhance speed and reliability, not access
No data monetization — never ads, never metadata harvesting
Transparent, independently auditable infrastructure

Ready for the technical deep-dive?

Transport Security Documentation