Get the App
Secure Drop
Anonymous · Encrypted · No login required
Your message is sealed and anonymous. We cannot identify you. No account or login is needed.
Your message
Max 3 files, 10 MB each
Secure Channel
Anonymous · Bidirectional · Encrypted
Start an anonymous conversation. You'll receive a thread code to check for replies later.
Your message
Max 3 files, 10 MB each
Thread Code
Enter your thread code above to check for replies.
Conversational Security Intelligence

The only secure messenger
with built-in cyber intelligence.

Start encrypted conversations instantly — and detect breaches and risks directly in your chat.

No phone number. No email. No identity required.

Type “check my email” — get instant breach and risk analysis.
End-to-End Encrypted Post-Quantum Ready Zero-Knowledge

Available on

Or use the Web App →

Built for security teams, journalists, and high-risk communications worldwide.

City of Hats App Dashboard
City of Hats Security Modes

Get started in 30 seconds

No phone number. No email. No sign-up form. Watch how to create your first anonymous Hat identity and start a secure conversation.

🎩
Create a disposable Hat identity instantly
🔒
End-to-end encrypted from the first message
🔥
Burn-after-read, 9 Security Modes, and more
🤖
CHECK bot for instant security intelligence

Secure messaging in seconds

01

Create a Hat

Pick a name — no phone number, no email, no personal information required. Your Hat is your anonymous identity.

Claim Your Hat ID
02

Start a Conversation

Share your Hat code with anyone. Messages are end-to-end encrypted with Double Ratchet + post-quantum key exchange.

Start Secure Channel
03

Call Securely

Encrypted voice and video calls — peer-to-peer, no metadata, no recordings. Something most secure messengers still cannot do.

Secure Calling
04

Add Intelligence

Type "check email you@example.com" to run a security check — results arrive as a self-destructing secure report.

CHECK Intelligence

Everything you need for private communication

Disposable Hat

Anonymous Hat Identities

Create disposable or permanent identities. No phone number. No email. Switch hats for different contexts.

Military-Grade Encryption

Military-Grade Encryption

Double Ratchet protocol with post-quantum CRYSTALS-Kyber key exchange. AES-256-GCM for every message.

Encrypted Calling

Encrypted Voice & Video

Peer-to-peer encrypted audio and video calls. No metadata. No recordings. No logs.

Dead Drop

Dead Drops

Send self-destructing messages that burn after reading. Set time locks, retrieval limits, and PIN protection.

GhostFrame Decode

GhostFrame

Hide encrypted messages inside ordinary images using steganography. The image looks normal — only City of Hats can decode it.

EchoDrop Decode

EchoDrop

Voice-passphrase triggered message retrieval. Speak the secret phrase to decrypt — all recognition happens on-device.

CHECK Intelligence Bot

CHECK Intelligence Bot

Type "check email", "check phone", "check domain" inside the chat. Get instant security reports delivered as self-destructing secure reports.

Warrant Canary

Warrant Canary

Cryptographic transparency. A public, signed proof that no government data requests have been received.

City of Hats GhostFrame

Hide messages inside ordinary images.

GhostFrame uses steganography to embed encrypted messages within photos. Share a normal-looking image that secretly carries your confidential content — invisible to anyone who does not have the key.

  • Embed text or data inside any photo — the image looks completely normal
  • PIN-protected decoding — only the intended recipient can extract the message
  • Invisible to detection — no visual difference between original and encoded image
  • Steganographic encoding — data is woven into pixel values, not metadata
  • Share anywhere — send the image through any channel, only City of Hats can decode it
City of Hats EchoDrop

Speak to unlock your messages.

EchoDrop is voice-passphrase message retrieval. Record a secret phrase when you send. The recipient must speak it back to decrypt. All voice recognition happens entirely on-device.

  • Voice-passphrase triggered decryption — no passwords to type
  • On-device voice recognition — nothing leaves the phone
  • End-to-end encrypted at rest and in transit
  • Set expiration timers and maximum retrieval attempts
  • No transcript, no recording stored — zero-knowledge by design
City of Hats Dead Drop

Messages that burn after reading.

Dead Drops are self-destructing encrypted messages. Send sensitive information that disappears permanently after retrieval — no copies, no cache, no trace.

  • Self-destructs after a single view — content is permanently erased
  • Optional PIN protection — only the intended recipient can open it
  • Time-locked delivery — set when the message becomes available
  • Anonymous retrieval — no account required to receive a Dead Drop
  • Server-side encrypted — even we cannot read the contents

9 security controls no other messenger offers

Every message and file you send comes with Security Modes — granular controls that keep the sender in charge.

#ModeDescription
1 View Once Self-destructs after a single view
2 Recall Pull it back anytime, even after delivery
3 Sealed File PIN-locked; share the code on your terms
4 Unlock Content Recipient pays to access
5 Verified Eyes Only Requires biometric face liveness verification
6 GeoLock Only viewable from an approved location
7 Voice Lock Recipient must pass voice verification
8 Hold to Reveal Must physically hold the screen to read
9 Certified Send Opens in a Protected Viewer with cryptographic proof of who opened it and when
1

View Once

Self-destructs after a single view

2

Recall

Pull it back anytime, even after delivery

3

Sealed File

PIN-locked; share the code on your terms

4

Unlock Content

Recipient pays to access

5

Verified Eyes Only

Requires biometric face liveness verification

6

GeoLock

Only viewable from an approved location

7

Voice Lock

Recipient must pass voice verification

8

Hold to Reveal

Must physically hold the screen to read

9

Certified Send

Opens in a Protected Viewer with cryptographic proof of who opened it and when

CHECK
> check email you@example.com
✓ 3 breaches found · risk: high
> check phone 0801110656
✓ carrier verified · no SIM swap
> check domain example.com
✓ 2 open ports · SSL valid
> check ip 8.8.8.8
✓ datacenter IP · no proxy
> check username johndoe
✓ found on 12 platforms
> check password test123
✓ exposed in 8 breaches

Cyber intelligence inside your conversations

No dashboard. No separate login. Just type a command in the chat.

What you get back

  • Risk scoring and exposure analysis
  • Credential detection across security databases
  • Carrier verification and SIM swap detection
  • IP reputation with VPN/proxy/Tor detection
  • Results delivered as self-destructing secure reports

Secure communication for sensitive business conversations

Financial Services

Banks, investors, and advisors sharing confidential documents and market-sensitive communications.

Legal & Compliance

Law firms protecting attorney-client privilege. Compliance teams handling sensitive investigations.

Healthcare

HIPAA-sensitive communications between providers, patients, and insurers.

Journalism & Sources

Reporters protecting sources with anonymous identities and burn-after-read messaging.

Encryption that protects you today and tomorrow

Double Ratchet Protocol

Forward secrecy — every message uses a unique key. Compromise one, the rest stay safe.

Post-Quantum Key Exchange

CRYSTALS-Kyber hybrid key exchange protects against future quantum computing threats.

AES-256-GCM

Military-grade symmetric encryption for every message, file, and call.

Zero-Knowledge Architecture

We cannot read your messages. No cloud backups. No metadata harvesting. No logs.

Start a secure conversation now

No sign-up required. No personal information needed. Just pick a Hat and start chatting.

Free forever. Premium features available.

Available on