The only secure messenger
with built-in cyber intelligence.
Launch branded guest, patient, staff, or customer experiences with QR access, NFC Hats, secure forms, live translation, and controlled sharing.
Concierge chat, room service, QR check-in, and multilingual guest communication — all branded to your property.
Secure patient intake forms, appointment messaging, medical file uploads, and HIPAA-ready controlled sharing.
NFC VIP access, attendee communication, secure ticketing, and real-time event updates for any venue.
Parent-teacher secure messaging, multilingual notices, permission forms, and student-safe communication channels.
Internal secure channels, controlled document sharing, anonymous tips, and zero-knowledge coordination.
Available on
Built for Every Industry
Hotels & Hospitality
- Concierge & guest chat
- QR check-in & room service
- Multilingual guest communication
- Branded property experience
Clinics & Healthcare
- Secure patient intake forms
- Appointment messaging
- Medical file uploads
- Controlled sharing & privacy
Events & Venues
- NFC VIP access & entry
- Attendee communication
- Real-time event updates
- Secure ticketing & badges
Schools & Education
- Parent-teacher messaging
- Multilingual notices
- Permission & consent forms
- Student-safe channels
Enterprise & Teams
- Secure internal channels
- Controlled document sharing
- Anonymous tips & reporting
- Zero-knowledge coordination
Get started in 30 seconds
No phone number. No email. No sign-up form. Watch how to create your first anonymous Hat identity and start a secure conversation.
Create Your Experience Visually
Build branded welcome flows, intake forms, menus, and secure communication — no code required. Your guests see your brand, not ours.
-
Visual Editor — Drag-and-drop builder for pages, forms, and flows
-
Branded Templates — Your logo, colors, and voice — on every screen
-
Secure Forms — Intake forms, consent, surveys — encrypted end-to-end
-
Custom Workflows — Automate onboarding, notifications, and responses
Instant Access.
No App Download Required.
No app store, no signup friction. Your guests are inside your experience in under 3 seconds.
-
NFC Hat Tap-to-Join — Tap a card to instantly enter a branded secure experience
-
QR Code Onboarding — Scan from any phone — works on every device, every browser
-
No App Required — Guests join through the web — zero download barriers
-
Branded Landing Pages — Your logo, your welcome message, your colors — instantly
Talk freely. In any language.
City of Hats translates every chat in 50+ languages, instantly and end-to-end encrypted. No tabs, no copy-paste, no third-party translation servers. Type in your language — your contacts read in theirs.
- 50+ languages with automatic detection on every message
- End-to-end encrypted — translations never leave the secure channel
- One-tap See original toggle on every translated bubble
- Voice notes auto-transcribed and translated in the same flow
- Works in 1:1 channels, group channels, Dead Drops and EchoDrops
Three Steps to Launch
Create Your Experience
Use the visual editor to build branded pages, forms, and communication flows — no code needed.
Share via QR, NFC, or Link
Guests tap an NFC Hat, scan a QR code, or click a link. No app download required.
Communicate Securely
Messaging, forms, uploads, live translation, and access control — all end-to-end encrypted.
Everything you need for private communication
Anonymous Hat Identities
Create disposable or permanent identities. No phone number. No email. Switch hats for different contexts.
Military-Grade Encryption
Double Ratchet protocol with post-quantum CRYSTALS-Kyber key exchange. AES-256-GCM for every message.
Encrypted Voice & Video
Peer-to-peer encrypted audio and video calls. No metadata. No recordings. No logs.
Dead Drops
Send self-destructing messages that burn after reading. Set time locks, retrieval limits, and PIN protection.
GhostFrame
Hide encrypted messages inside ordinary images using steganography. The image looks normal — only City of Hats can decode it.
EchoDrop
Voice-passphrase triggered message retrieval. Speak the secret phrase to decrypt — all recognition happens on-device.
CHECK Intelligence Bot
Type "check email", "check phone", "check domain" inside the chat. Get instant security reports delivered as self-destructing secure reports.
Warrant Canary
Cryptographic transparency. A public, signed proof that no government data requests have been received.
10 security controls no other messenger offers
Every message and file you send comes with Security Modes — granular controls that keep the sender in charge.
| # | Mode | Description | |
|---|---|---|---|
| 1 | View Once | Self-destructs after a single view | |
| 2 | Recall | Pull it back anytime, even after delivery | |
| 3 | Sealed File | PIN-locked; share the code on your terms | |
| 4 | Unlock Content | Recipient pays to access | |
| 5 | Verified Eyes Only | Requires biometric face liveness verification | |
| 6 | GeoLock | Only viewable from an approved location | |
| 7 | Voice Lock | Recipient must pass voice verification | |
| 8 | Hold to Reveal | Must physically hold the screen to read | |
| 9 | Certified Send | Opens in a Protected Viewer with cryptographic proof of who opened it and when | |
| 10 | Hat Tap to Unlock | Recipient must tap their NFC Hat to view the file — physical presence required |
View Once
Self-destructs after a single view
Recall
Pull it back anytime, even after delivery
Sealed File
PIN-locked; share the code on your terms
Unlock Content
Recipient pays to access
Verified Eyes Only
Requires biometric face liveness verification
GeoLock
Only viewable from an approved location
Voice Lock
Recipient must pass voice verification
Hold to Reveal
Must physically hold the screen to read
Certified Send
Opens in a Protected Viewer with cryptographic proof of who opened it and when
Hat Tap to Unlock
Recipient must tap their NFC Hat to view the file — physical presence required
Cyber intelligence inside your conversations
No dashboard. No separate login. Just type a command in the chat.
What you get back
- Risk scoring and exposure analysis
- Credential detection across security databases
- Carrier verification and SIM swap detection
- IP reputation with VPN/proxy/Tor detection
- Results delivered as self-destructing secure reports
Encryption that protects you today and tomorrow
Double Ratchet Protocol
Forward secrecy — every message uses a unique key. Compromise one, the rest stay safe.
Post-Quantum Key Exchange
CRYSTALS-Kyber hybrid key exchange protects against future quantum computing threats.
AES-256-GCM
Military-grade symmetric encryption for every message, file, and call.
Zero-Knowledge Architecture
We cannot read your messages. No cloud backups. No metadata harvesting. No logs.
Launch Your First Experience
Create branded secure communication for your guests, patients, or team — free to start, no credit card required.
Free forever. Premium features available.
Available on