SOC 2 CertifiedGDPR CompliantISO 27001WCAG AAA
24/7 Enterprise SupportLog In
Zero-Knowledge Architecture

Advanced Security Features
Federated & Encrypted

Built on a foundation of zero-knowledge encryption and federated architecture. Your data remains completely private with self-destructing messages and decentralized infrastructure that you control.

πŸ”Zero-Knowledge Encrypted Self-Destruction

Messages that disappear without a trace, protected by encryption so advanced that even we can't read them

How Zero-Knowledge Encryption Works

1

Client-Side Encryption

Your message is encrypted on your device using AES-256 with NaCl secretbox primitives before it ever leaves your computer. We never see the plaintext.

2

Deterministic Group Keys

Encryption keys are generated using SHA-256 hash of group IDs, ensuring all participants use identical keys without key exchange.

3

Perfect Forward Secrecy

Each message uses a unique nonce, and keys rotate automatically. Even if one key is compromised, past messages remain secure.

4

Cryptographic Erasure

When messages self-destruct, we don't just delete the fileβ€”we destroy the encryption keys, making recovery mathematically impossible.

βœ“Zero-Knowledge Guarantee

Taps.IM servers only see encrypted data blobs. We have no keys, no plaintext, and no way to access your messagesβ€”even if compelled by law enforcement.

⏱️

Timed Destruction

  • β€’Custom timers: 1 minute to 1 year
  • β€’Countdown visible to all participants
  • β€’Automatic key destruction on expiry
πŸ‘οΈ

Read-Once Messages

  • β€’Messages vanish after being read
  • β€’Read receipts with destruction confirmation
  • β€’Screenshots detection and prevention
🚨

Emergency Wipe

  • β€’Instant conversation destruction
  • β€’Panic button for all devices
  • β€’Secure overwrite of local storage

🌐Federated Server Architecture

Decentralized infrastructure that you control. No single point of failure, no vendor lock-in, complete data sovereignty.

How Federation Works

🏒

Your Server

Deploy on your infrastructure with full control over data and policies

πŸ”„

Real-time Sync

HTTP/2 streaming with NDJSON frames for instant message propagation

🌍

Global Network

Connect with other organizations while maintaining your data sovereignty

⚑Federation Protocol Features

  • βœ“ULID-based message deduplication
  • βœ“CREDIT-based backpressure control
  • βœ“PING/PONG keepalive mechanisms
  • βœ“Automatic connection retry with backoff
  • βœ“Thread-safe cross-server message relay
  • βœ“Opaque E2EE payload support

πŸ›οΈWhy Federation Matters

Data Sovereignty

Keep your organization's communications on your own infrastructure. No third-party can access, analyze, or monetize your data.

No Vendor Lock-in

Open-source federation protocol means you can migrate between providers or run your own infrastructure without losing connectivity.

Resilience & Redundancy

If one server goes down, the network continues operating. Messages are relayed through available nodes automatically.

Compliance Control

Meet specific regulatory requirements by controlling exactly where data is stored and how it's processed.

☁️

Cloud Deployment

  • β€’AWS, Azure, GCP compatible
  • β€’Kubernetes and Docker support
  • β€’Auto-scaling and load balancing
🏒

On-Premise

  • β€’Full air-gapped deployment
  • β€’Integration with existing infrastructure
  • β€’Custom hardware security modules
🌐

Hybrid Networks

  • β€’Mix of cloud and on-premise servers
  • β€’Selective federation policies
  • β€’Geo-distributed resilience

Technical Implementation

Federation Protocol Stack

HTTP/2 StreamingBidirectional real-time communication with h2c cleartext support
NDJSON Frame ProtocolStructured message frames with ULID-based deduplication
Media Type Negotiationapplication/x-ndjson; profile="_taps.v1.frames"

Reliability Features

Flow ControlCREDIT-based backpressure with 1000 event budget management
Keepalive SystemPING/PONG frames every 30s with 90s timeout detection
Connection RecoveryExponential backoff retry with graceful stream lifecycle

Additional Security Features

Comprehensive security tools that complement our zero-knowledge and federated architecture

Verified Identities

Multi-factor authentication and identity verification ensure you're always communicating with the right person.

  • βœ“Biometric authentication
  • βœ“Safety numbers verification
  • βœ“Hardware key support

Secure File Sharing

Share documents, images, and files up to 5GB with the same encryption standards as messages. All file types supported.

  • βœ“Encrypted file storage
  • βœ“Virus scanning
  • βœ“Access controls

Anonymous Mode

Communicate without revealing your identity. Perfect for whistleblowers, journalists, and privacy-conscious users.

  • βœ“No phone number required
  • βœ“Tor network support
  • βœ“Disposable identities

Multi-Platform Sync

Seamlessly sync across all your devices while maintaining end-to-end encryption. Available on desktop, mobile, and web.

  • βœ“Real-time synchronization
  • βœ“Offline access
  • βœ“Cross-platform compatibility

Advanced Authentication

Multiple authentication methods including hardware tokens, biometrics, and enterprise SSO integration.

  • βœ“FIDO2/WebAuthn support
  • βœ“SAML 2.0 & OAuth integration
  • βœ“YubiKey compatibility

Compliance & Auditing

Complete audit trails and compliance tools for enterprises that need to meet regulatory requirements.

  • βœ“Detailed audit logs
  • βœ“Data retention policies
  • βœ“Compliance reporting

Advanced Capabilities

Professional tools for teams and organizations

πŸ‘₯Team Collaboration

  • β€’
    Secure Group ChatsEnd-to-end encrypted group conversations with up to 1000 members
  • β€’
    Voice & Video CallsCrystal-clear encrypted calls with screen sharing capabilities
  • β€’
    Team WorkspacesOrganized channels for different projects and departments
  • β€’
    Admin ControlsGranular permissions and access management

πŸ”§Enterprise Integration

  • β€’
    API AccessRESTful API for custom integrations and automation
  • β€’
    SSO IntegrationSAML 2.0 and OAuth support for seamless authentication
  • β€’
    Compliance ToolsAudit logs, data retention policies, and export capabilities
  • β€’
    Custom DeploymentOn-premise or private cloud deployment options

Security First

Built from the ground up with security as the foundation

πŸ”’

Zero-Trust Architecture

Never trust, always verify. Every request is authenticated and encrypted.

πŸ›‘οΈ

DDoS Protection

Enterprise-grade protection against distributed denial-of-service attacks.

πŸ”

Hardware Security

Support for hardware security modules and secure enclaves.

Compliance & Certifications

GDPRCompliant
HIPAAReady
SOC 2Type II
ISO 27001Certified

Ready to Deploy Your Secure Infrastructure?

Experience zero-knowledge encryption and federated architecture in your environment. Complete data sovereignty with enterprise-grade security.

πŸ”
Zero-Knowledge
We never see your data
🌐
Federated
Deploy on your infrastructure
⚑
Enterprise Ready
SOC 2, GDPR, HIPAA compliant

No vendor lock-in β€’ Full source code access β€’ 24/7 enterprise support