End-to-end encrypted
Only the two endpoints can read content. No server, ISP, or relay operator can.
owned is a mobile-only, end-to-end encrypted messenger for sensitive personal communication between people who already know each other in real life.
Who it’s for
Mainstream messengers harvest contact graphs, link your phone number to your real-world identity, and run analytics on who you talk to and when. owned doesn’t. No public discovery, no usernames to search, no friend suggestions, no “people you may know” — and no phone number, email, or account at all. You add a contact by scanning their QR code in person, or by holding the two phones together. From that moment the encryption is end-to-end between the two of you — never the operator, never the relay, never us. If you wouldn’t share a house key with the person face-to-face, owned won’t pretend you met online.
Two phones, an opaque relay between them, no plaintext anywhere off-device. You add a contact by scanning their QR in person — that’s the only step where you decide who to trust.
The relay only sees a per-install routing token and a padded envelope of a fixed size bucket. It does not know who you are, who you talk to, or what you say.
Text, photos and voice notes all flow through the same sealed envelope. Saved photos and your own albums stay inside the app under the same key — there is no “export to Photos” button by design.
Plaintext lives here. Keys live here.
Padded ciphertext + a routing token. No sender, no recipient handle, no content.
Plaintext appears here. Keys live here.
The two endpoints know everything. The relay knows nothing it didn’t need to route the bytes.
Only the two endpoints can read content. No server, ISP, or relay operator can.
Compromise of long-term keys does not compromise past messages.
A future compromise heals — messages sent after recovery are protected again.
Handshake and ratchet combine classical X25519 with ML-KEM. Recorded ciphertext can’t be decrypted by a future quantum computer.
The relay sees only a per-install token and a size-bucket — not the sender, recipient handle, or content.
No directory linking handles to anything. No long-term registry of identities, recipient tokens, or device tokens.
Identity secrets are wrapped under the Secure Enclave and require Face ID / Touch ID to unwrap.
Every wire envelope is padded to one of a small fixed set of size buckets — a network observer learns nothing from length.
A 24-word recovery phrase you transcribe is the only path back to your identity. No escrow, no operator-mediated recovery.
One identity, one device. Device migration is a sequential, end-to-end-encrypted handoff between your phones.
Face ID / Touch ID is required every time you open the app. A five-second grace from backgrounding allows silent re-entry; cold start always prompts.
The iOS app speaks to the relay over a hidden service via embedded Tor. Your IP never reaches the operator.
Contacts see an “inactive” tag when you’ve been away for a week. The relay records the day you last fetched — no finer, no online/offline timeline.
The summary above is the visual précis. For the threat model, cryptographic primitives, the exact bytes the relay sees, and the honest list of known gaps, read the full security model →
Headlines only — later milestones layer features on top without weakening V1’s security model.
Availability. iOS is the only platform under active development — currently in internal TestFlight, with external TestFlight opening once V6 (proximity pairing) lands. Android is planned for the future, after iOS is fully shipped and the security model has held up in real-world use. No Android timeline is committed.
Two phones, one trusted contact each. End-to-end encrypted text under the full security model — PQ-hybrid handshake, sealed sender, ratchet, padding.
A display name and avatar shared with already-verified contacts. End-to-end encrypted to the recipient set; the relay never sees them in cleartext.
Photo and voice messages captured and encoded in-app. Built-in gallery with custom albums; nothing ever leaves the device unencrypted.
Opt-in. Sealed on-device under a mnemonic-derived key; the cloud provider sees only ciphertext. Pick any folder — iCloud Drive, Dropbox, Google Drive, OneDrive — and restore on a new phone by pointing owned at the same file.
✓ delivered to relay, ✓✓ delivered to device. Contacts silent on the relay for over a week show as “inactive” with a confirmation before media uploads. Relay records the day, not the time.
Add a contact by holding the two phones together. Same trust gate as a QR scan: a mandatory mutual safety-code comparison after handshake.
One-off in-app payment using unlinkable tokens — the relay can verify “this caller paid” without learning who they are. Establishes the payment infrastructure for V8 and V9.
Up to 20 members. End-to-end encrypted under a group-suitable PQ ciphersuite; the relay can’t tell a group send from a 1:1.
Video on the 1:1 channel (and groups, once V8 has shipped). Captured and encoded in-app, sealed-sender envelope shape.
Aggregate request counts only — no recipient, sender, or per-request-kind data is exposed publicly.
| date | requests | bytes in | bytes out |
|---|