Open source ยท End-to-end encrypted

Privacy is not a feature.

Pitopi enables real-time, peer-to-peer communication with no servers in between. Your messages never touch our infrastructure.

Get Started Free View Source
P2P
Architecture
0
Logs Stored
E2E
Encrypted

Built different.
By design.

Every decision we made was driven by one question: how do we get out of the way?

๐Ÿ”’
Zero-Knowledge
We have no idea what you're talking about. Literally. Messages are encrypted before they leave your device.
โšก
Real-Time P2P
WebRTC creates a direct tunnel between you and your contact. No relay servers, no latency overhead.
๐Ÿ—๏ธ
Key-Based Auth
No passwords, no emails, no phone numbers. A cryptographic key file is your identity โ€” lose it and we can't help you recover it.
๐Ÿ“ก
Story Sharing
Share moments that disappear in 12 hours. Viewable by anyone on the network, stored nowhere permanently.
๐Ÿšซ
No Ads. Ever.
Your attention is not our product. Pitopi is free because we believe privacy should be accessible, not monetized.
๐ŸŒ
Open Source
Every line of code is public. Audit it, fork it, improve it. Trust through transparency, not promises.

Three steps.
That's it.

01

Download your key

Generate a unique cryptographic key file. This 96-byte file is your entire identity. No sign-up form needed.

02

Connect to the network

Upload your key to sign in. You appear in the user list and can see who else is online right now.

03

Start a private session

Click a user, accept the WebRTC handshake, and your encrypted tunnel is live. Direct. Serverless. Instant.

pitopi

Designed to be
uncompromising.

๐Ÿ›ก๏ธ

Brute-Force Protection

Rate limiting and IP banning prevent automated attacks. After 5 failed attempts, access is suspended for 15 minutes.

โ— Active
๐Ÿ“

Exact-Byte Validation

Key files must be precisely 96 bytes. Anything else is rejected before parsing โ€” no attack surface for malformed payloads.

โ— Active
๐Ÿ”

No Stored Messages

Pitopi's server facilitates the WebRTC handshake only. Once connected, all data flows directly between peers. We couldn't read your messages even if we wanted to.

โ— Verified by design
Data flow audit
Message โ†’ Peer โœ“
Message โ†’ Server โœ—
Message โ†’ Database โœ—
Message โ†’ Logs โœ—
Message โ†’ Analytics โœ—

Start a private
conversation.

No account. No email. No phone number. Just download a key and you're in.

Open Pitopi โ†’