Get the App
Secure Drop
Anonymous · Encrypted · No login required
Your message is sealed and anonymous. We cannot identify you. No account or login is needed.
Your message
Max 3 files, 10 MB each
Secure Channel
Anonymous · Bidirectional · Encrypted
Start an anonymous conversation. You'll receive a thread code to check for replies later.
Your message
Max 3 files, 10 MB each
Thread Code
Enter your thread code above to check for replies.
Conversational Security Intelligence

Launch branded secure experiences beyond messaging.

QR onboarding, NFC, translation, controlled sharing, and operational workflows in one platform.

Traditional messaging

Great for chatting. Limited for secure branded operations.

Traditional chat apps were built for conversation, not for identity, workflow, and controlled business communication.

  • No identity verification workflow
  • No branded experience control
  • No secure forms and intake
  • No controlled sharing rules
  • No built-in live translation
  • No enterprise policy layer
Where messaging is evolving

Secure messaging first. Then everything your operation needs.

City of Hats starts with secure communication, then adds onboarding, branded workflows, and policy controls in one unified platform.

📲
QR + NFC Hats
🌐
Live Translation
🛡️
Controlled Sharing
🏷️
Branded Experience
Live translation in action
Guest Necesito ayuda
Staff I need help
City of Hats secure messaging dashboard screenshot
City of Hats security controls screenshot
City of Hats translation screenshot

Available on

Use Cases

Built for Every Industry

One secure platform. Endless ways to connect, engage, and operate.

Hotels & Hospitality

  • Concierge and guest chat
  • QR check-in and room service
  • Multilingual guest communication
  • Branded property experience
Hotels and hospitality use case

Healthcare

  • Secure patient intake forms
  • Appointment messaging
  • Medical file uploads
  • Controlled sharing and privacy
Healthcare use case

Schools & Education

  • Parent-teacher messaging
  • Multilingual notices
  • Permission and consent forms
  • Student-safe channels
Schools and education use case

Enterprise & Teams

  • Secure internal channels
  • Controlled document sharing
  • Anonymous tips and reporting
  • Zero-knowledge coordination
Enterprise and teams use case
🔒

End-to-End Encrypted

Your data stays private, always.

🛡️

Brand Your Experience

Create trusted, on-brand interactions.

🌐

Speak Every Language

Real-time translation breaks barriers.

🤝

Inspire Trust

Secure, compliant, and built for real-world use.

One Platform. Infinite Possibilities.

All the tools you need. All in one place.

Get started in 30 seconds

No phone number. No email. No sign-up form. Watch how to create your first anonymous Hat identity and start a secure conversation.

🎩
Create a disposable Hat identity instantly
🔒
End-to-end encrypted from the first message
🔥
Burn-after-read, 9 Security Modes, and more
🤖
CHECK bot for instant security intelligence
City of Hats Visual Editor

Create Your Experience Visually

Build branded welcome flows, intake forms, menus, and secure communication — no code required. Your guests see your brand, not ours.

  • Visual Editor — Drag-and-drop builder for pages, forms, and flows
  • Branded Templates — Your logo, colors, and voice — on every screen
  • Secure Forms — Intake forms, consent, surveys — encrypted end-to-end
  • Custom Workflows — Automate onboarding, notifications, and responses
NFC Hat Tap-to-Join

Instant Access.
No App Download Required.

No app store, no signup friction. Your guests are inside your experience in under 3 seconds.

  • NFC Hat Tap-to-Join — Tap a card to instantly enter a branded secure experience
  • QR Code Onboarding — Scan from any phone — works on every device, every browser
  • No App Required — Guests join through the web — zero download barriers
  • Branded Landing Pages — Your logo, your welcome message, your colors — instantly
City of Hats Auto-Translate

Talk freely. In any language.

City of Hats translates every chat in 50+ languages, instantly and end-to-end encrypted. No tabs, no copy-paste, no third-party translation servers. Type in your language — your contacts read in theirs.

  • 50+ languages with automatic detection on every message
  • End-to-end encrypted — translations never leave the secure channel
  • One-tap See original toggle on every translated bubble
  • Voice notes auto-transcribed and translated in the same flow
  • Works in 1:1 channels, group channels, Dead Drops and EchoDrops

Three Steps to Launch

01

Create Your Experience

Use the visual editor to build branded pages, forms, and communication flows — no code needed.

02

Share via QR, NFC, or Link

Guests tap an NFC Hat, scan a QR code, or click a link. No app download required.

03

Communicate Securely

Messaging, forms, uploads, live translation, and access control — all end-to-end encrypted.

Everything you need for private communication

Disposable Hat

Anonymous Hat Identities

Create disposable or permanent identities. No phone number. No email. Switch hats for different contexts.

Military-Grade Encryption

Military-Grade Encryption

Double Ratchet protocol with post-quantum CRYSTALS-Kyber key exchange. AES-256-GCM for every message.

Encrypted Calling

Encrypted Voice & Video

Peer-to-peer encrypted audio and video calls. No metadata. No recordings. No logs.

Dead Drop

Dead Drops

Send self-destructing messages that burn after reading. Set time locks, retrieval limits, and PIN protection.

GhostFrame

GhostFrame

Hide encrypted messages inside ordinary images using steganography. The image looks normal — only City of Hats can decode it.

EchoDrop

EchoDrop

Voice-passphrase triggered message retrieval. Speak the secret phrase to decrypt — all recognition happens on-device.

CHECK Intelligence

CHECK Intelligence Bot

Type "check email", "check phone", "check domain" inside the chat. Get instant security reports delivered as self-destructing secure reports.

Warrant Canary

Warrant Canary

Cryptographic transparency. A public, signed proof that no government data requests have been received.

10 security controls no other messenger offers

Every message and file you send comes with Security Modes — granular controls that keep the sender in charge.

#ModeDescription
1 View Once Self-destructs after a single view
2 Recall Pull it back anytime, even after delivery
3 Sealed File PIN-locked; share the code on your terms
4 Unlock Content Recipient pays to access
5 Verified Eyes Only Requires biometric face liveness verification
6 GeoLock Only viewable from an approved location
7 Voice Lock Recipient must pass voice verification
8 Hold to Reveal Must physically hold the screen to read
9 Certified Send Opens in a Protected Viewer with cryptographic proof of who opened it and when
10 Hat Tap to Unlock Recipient must tap their NFC Hat to view the file — physical presence required
1

View Once

Self-destructs after a single view

2

Recall

Pull it back anytime, even after delivery

3

Sealed File

PIN-locked; share the code on your terms

4

Unlock Content

Recipient pays to access

5

Verified Eyes Only

Requires biometric face liveness verification

6

GeoLock

Only viewable from an approved location

7

Voice Lock

Recipient must pass voice verification

8

Hold to Reveal

Must physically hold the screen to read

9

Certified Send

Opens in a Protected Viewer with cryptographic proof of who opened it and when

10

Hat Tap to Unlock

Recipient must tap their NFC Hat to view the file — physical presence required

CHECK
> check email you@example.com
✓ 3 breaches found · risk: high
> check phone 0801110656
✓ carrier verified · no SIM swap
> check domain example.com
✓ 2 open ports · SSL valid
> check ip 8.8.8.8
✓ datacenter IP · no proxy

Cyber intelligence inside your conversations

No dashboard. No separate login. Just type a command in the chat.

What you get back

  • Risk scoring and exposure analysis
  • Credential detection across security databases
  • Carrier verification and SIM swap detection
  • IP reputation with VPN/proxy/Tor detection
  • Results delivered as self-destructing secure reports

Encryption that protects you today and tomorrow

Double Ratchet Protocol

Forward secrecy — every message uses a unique key. Compromise one, the rest stay safe.

Post-Quantum Key Exchange

CRYSTALS-Kyber hybrid key exchange protects against future quantum computing threats.

AES-256-GCM

Military-grade symmetric encryption for every message, file, and call.

Zero-Knowledge Architecture

We cannot read your messages. No cloud backups. No metadata harvesting. No logs.

Launch Your First Experience

Create branded secure communication for your guests, patients, or team — free to start, no credit card required.

Free forever. Premium features available.

Available on