No Accounts, No Identity

Y Communicator breaks free from the traditional messaging paradigm. There's no sign-up process, no phone number verification, no email required. Your device generates cryptographic keys locally, and you're ready to communicate.

  • No phone numbers, emails, or usernames required
  • No central identity registry to hack or subpoena
  • Generate your identity locally in seconds
  • Connect with contacts via QR code or shared link
  • We can't identify you because we never ask who you are
👤
Traditional Apps

Phone + Email + Username + Profile

Y Communicator

Just install and go. Nothing more.

Post-Quantum Encryption

Today's encryption may be vulnerable to tomorrow's quantum computers. Y Communicator uses NIST-standardized post-quantum algorithms to ensure your messages remain confidential even against future threats.

  • ML-KEM (Kyber-class) for quantum-resistant key exchange
  • Dilithium for post-quantum digital signatures
  • AES-256-GCM for symmetric message encryption
  • Protected against "harvest now, decrypt later" attacks
  • Future-proof security for decades to come
🔐
Key Exchange

ML-KEM (Kyber-1024)

Signatures

Dilithium-class

🔒
Content Encryption

AES-256-GCM

Anonymous Rotating Addresses

Instead of phone numbers or usernames, Y Communicator uses cryptographic addresses derived from local secrets. These addresses are SHA3-256 hashes that can't be reversed to identify you.

  • Addresses are cryptographic hashes with no personal info
  • Automatic address rotation (hourly or per conversation)
  • Impossible to link addresses to real-world identities
  • Servers see only random strings, never who you are
  • Each conversation can use unique addressing

a7f3b2c9...8d4e
↓ rotates to ↓
9c2d8f1a...7b3a

Your address changes automatically, making tracking impossible

Zero-Trust RAM-Only Nodes

Our relay nodes are designed assuming they will be compromised. They store encrypted messages only in RAM, never on disk, and have no access to encryption keys or user identities.

  • Messages stored in RAM only, never written to disk
  • Automatic message expiration (max 2 hours)
  • Delete-on-pickup: messages removed after delivery
  • Nodes see only encrypted blobs and anonymous addresses
  • Compromised nodes reveal nothing useful to attackers
🖥
RAM-Only Storage

No permanent disk storage

🕐
Auto-Expiration

Messages deleted in max 2 hours

🗑
Delete on Pickup

Removed immediately when delivered

Distributed Network Architecture

Y Communicator operates on a decentralized network of nodes that maintain an eventually consistent directory using signed announcements and gossip protocols. No single point of failure.

  • Messages replicated across multiple random nodes
  • No single point of failure or control
  • Proof-of-work and reputation to resist Sybil attacks
  • Nodes discover each other via gossip protocol
  • Resilient against censorship and blocking
N1
N2
N3

Distributed nodes with no central authority

Device-Centric Security

All cryptographic operations happen on your device. Private keys are stored in hardware-backed secure storage (iOS Keychain, Android Keystore) and never leave your device.

  • Keys generated and stored on-device only
  • Hardware-backed secure storage (TEE/Secure Enclave)
  • Local encryption of message history
  • Device lock required to access messages
  • No cloud backups of encryption keys
📱
iOS

Secure Enclave + Keychain

🤖
Android

TEE + Keystore

Advanced Security Features

Beyond the basics, Y Communicator includes cutting-edge features for maximum security.

📈

Cloning Detection

Sequence numbers, heartbeat mechanisms, and challenge-response protocols detect if your device has been cloned or compromised.

Traffic Analysis Defense

Jittered delays, message padding, and optional dummy traffic make timing and size correlation attacks impractical.

🔗

Decentralized Key Revocation

A lightweight blockchain-based system distributes key revocations across the network without central servers.

Experience True Privacy

Download Y Communicator and communicate with confidence knowing your conversations are truly private.

Download Y Communicator