Discover the advanced capabilities that make Y Communicator uniquely private and secure.
Y Communicator breaks free from the traditional messaging paradigm. There's no sign-up process, no phone number verification, and no email required. Your device keeps its own keys locally, and each session is established directly with the other device.
Phone + Email + Username + Profile
Just install and go. Nothing more.
Today's encryption may be vulnerable to tomorrow's quantum computers. Y Communicator uses NIST-standardized post-quantum algorithms to ensure your messages remain confidential even against future threats.
ML-KEM (Kyber-1024)
Dilithium-class
AES-256-GCM
Instead of phone numbers or usernames, Y Communicator uses cryptographic addresses derived from local secrets. These addresses are SHA3-256 hashes that can't be reversed to identify you.
a7f3b2c9...8d4e
↓ rotates to ↓
9c2d8f1a...7b3a
Your address changes automatically, making tracking impossible
Our relay nodes are designed assuming they will be compromised. They store encrypted messages only in RAM, never on disk, and have no access to encryption keys or any personal profile data.
No permanent disk storage
Messages deleted in max 2 hours
Removed immediately when delivered
Y Communicator operates on a decentralized network of nodes that maintain an eventually consistent directory using signed announcements and gossip protocols. No single point of failure.
Distributed nodes with no central authority
All cryptographic operations happen on your device. Private keys are stored in hardware-backed secure storage (iOS Keychain, Android Keystore) and never leave your device.
Secure Enclave + Keychain
TEE + Keystore
Beyond the basics, Y Communicator includes cutting-edge features for maximum security.
Sequence numbers, heartbeat mechanisms, and challenge-response protocols detect if your device has been cloned or compromised.
Jittered delays, message padding, and optional dummy traffic make timing and size correlation attacks impractical.
A lightweight blockchain-based system distributes key revocations across the network without central servers.
Download Y Communicator and start a conversation without handing over your phone number, email, or personal information.
Download Y Communicator