Security deep dive

How Cloak protects your data

Cloak doesn't just promise privacy. We engineer it into every layer. From the cryptographic protocols to local key storage, here is exactly how your data stays yours.

End-to-end encrypted, always

Every message, every call, every file, encrypted on your device before it ever touches the network. The server stores only ciphertext. No backdoors, no exceptions.

Signal ProtocolAES-256-GCMCurve25519Forward SecrecyZero Knowledge
1

Signal Protocol

Trusted by millions, built into Cloak

Cloak uses the Signal Protocol, the same end-to-end encryption standard trusted by Signal, for secure key exchange between users. Curve25519 key pairs and the Double Ratchet Algorithm ensure that every session produces unique encryption keys.

2

AES-256-GCM Message Encryption

Military-grade cipher, per-message randomness

Every message is encrypted client-side with AES-256-GCM, an authenticated encryption standard used by governments and financial institutions worldwide. Each message gets a unique, cryptographically random initialization vector (IV), so identical messages produce completely different ciphertext. The authentication tag ensures messages cannot be tampered with in transit.

3

Zero-Knowledge Architecture

We can't read your messages. By design.

All encryption and decryption happens entirely on your device. The server only ever sees encrypted blobs, never plaintext. Even Cloak's own infrastructure cannot access your messages, files, or call content. Your data is yours alone.

4

Per-Conversation Keys

Unique keys for every DM and every room

Each direct message conversation and each server room uses its own unique encryption key derived from Curve25519 key pairs. Room owners can cycle encryption keys at any time, instantly revoking access for removed members and generating fresh keys for the room.

5

Secret Key Recovery

You hold the master key, not us

At account creation, Cloak generates a 64-character cryptographically random secret key that only you possess. This key encrypts your identity keys with AES-256-GCM before they are backed up to the server. Without your secret key, your identity and message history cannot be recovered, not even by Cloak.

6

Encrypted Voice & Video

End-to-end encrypted calls, frame by frame

Voice and video calls are protected with end-to-end encryption using the WebRTC Insertable Streams API. Every audio and video frame is encrypted before it leaves your device, ensuring that call content is only accessible to participants: not the server, not intermediaries, not anyone else.

Technical specifications

The cryptographic primitives and transport protocols powering Cloak's security.

Key Exchange
Signal Protocol (Curve25519, Double Ratchet)
Message Cipher
AES-256-GCM with per-message random IV
Key Storage
OS Keychain (macOS Keychain / Windows DPAPI)
Transport
HTTP/3 WebTransport over TLS 1.3
Media Encryption
WebRTC Insertable Streams (E2EE)
Identity Backup
AES-256-GCM encrypted with user-held secret key
Open architecture, no proprietary black boxes

Cloak is built on industry-standard, peer-reviewed cryptographic protocols. We don't invent our own crypto. We use the same proven primitives trusted by security researchers, governments, and billions of users worldwide. Your data is protected by math, not promises.

Cloak Chat is in active development

Join the waitlist and be the first to know when Cloak Chat launches