Get the App
Secure Drop
Anonymous · Encrypted · No login required
Your message is sealed and anonymous. We cannot identify you. No account or login is needed.
Your message
Max 3 files, 10 MB each
Secure Channel
Anonymous · Bidirectional · Encrypted
Start an anonymous conversation. You'll receive a thread code to check for replies later.
Your message
Max 3 files, 10 MB each
Thread Code
Enter your thread code above to check for replies.
Conversational Security Intelligence

The only secure messenger
with built-in cyber intelligence.

Start encrypted conversations instantly — and detect breaches and risks directly in your chat.

No phone number. No email. No identity required.

Type “check my email” — get instant breach and risk analysis.
End-to-End Encrypted Post-Quantum Ready Zero-Knowledge

Available on

Or use the Web App →

Built for security teams, journalists, and high-risk communications worldwide.

City of Hats App Dashboard
City of Hats Security Modes

Get started in 30 seconds

No phone number. No email. No sign-up form. Watch how to create your first anonymous Hat identity and start a secure conversation.

🎩
Create a disposable Hat identity instantly
🔒
End-to-end encrypted from the first message
🔥
Burn-after-read, 9 Security Modes, and more
🤖
CHECK bot for instant security intelligence
City of Hats Auto-Translate in 50+ languages, end-to-end encrypted

Talk freely. In any language.

City of Hats translates every chat in 50+ languages, instantly and end-to-end encrypted. No tabs, no copy-paste, no third-party translation servers. Type in your language — your contacts read in theirs.

  • 50+ languages with automatic detection on every message
  • End-to-end encrypted — translations never leave the secure channel
  • One-tap See original toggle on every translated bubble
  • Voice notes auto-transcribed and translated in the same flow
  • Works in 1:1 channels, group channels, Dead Drops and EchoDrops

Secure messaging in seconds

01

Create a Hat

Pick a name — no phone number, no email, no personal information required. Your Hat is your anonymous identity.

Claim Your Hat ID
02

Start a Conversation

Share your Hat code with anyone. Messages are end-to-end encrypted with Double Ratchet + post-quantum key exchange.

Start Secure Channel
03

Call Securely

Encrypted voice and video calls — peer-to-peer, no metadata, no recordings. Something most secure messengers still cannot do.

Secure Calling
04

Add Intelligence

Type "check email you@example.com" to run a security check — results arrive as a self-destructing secure report.

CHECK Intelligence

Everything you need for private communication

Disposable Hat

Anonymous Hat Identities

Create disposable or permanent identities. No phone number. No email. Switch hats for different contexts.

Military-Grade Encryption

Military-Grade Encryption

Double Ratchet protocol with post-quantum CRYSTALS-Kyber key exchange. AES-256-GCM for every message.

Encrypted Calling

Encrypted Voice & Video

Peer-to-peer encrypted audio and video calls. No metadata. No recordings. No logs.

Dead Drop

Dead Drops

Send self-destructing messages that burn after reading. Set time locks, retrieval limits, and PIN protection.

GhostFrame Decode

GhostFrame

Hide encrypted messages inside ordinary images using steganography. The image looks normal — only City of Hats can decode it.

EchoDrop Decode

EchoDrop

Voice-passphrase triggered message retrieval. Speak the secret phrase to decrypt — all recognition happens on-device.

CHECK Intelligence Bot

CHECK Intelligence Bot

Type "check email", "check phone", "check domain" inside the chat. Get instant security reports delivered as self-destructing secure reports.

Warrant Canary

Warrant Canary

Cryptographic transparency. A public, signed proof that no government data requests have been received.

City of Hats GhostFrame

Hide messages inside ordinary images.

GhostFrame uses steganography to embed encrypted messages within photos. Share a normal-looking image that secretly carries your confidential content — invisible to anyone who does not have the key.

  • Embed text or data inside any photo — the image looks completely normal
  • PIN-protected decoding — only the intended recipient can extract the message
  • Invisible to detection — no visual difference between original and encoded image
  • Steganographic encoding — data is woven into pixel values, not metadata
  • Share anywhere — send the image through any channel, only City of Hats can decode it
City of Hats EchoDrop

Speak to unlock your messages.

EchoDrop is voice-passphrase message retrieval. Record a secret phrase when you send. The recipient must speak it back to decrypt. All voice recognition happens entirely on-device.

  • Voice-passphrase triggered decryption — no passwords to type
  • On-device voice recognition — nothing leaves the phone
  • End-to-end encrypted at rest and in transit
  • Set expiration timers and maximum retrieval attempts
  • No transcript, no recording stored — zero-knowledge by design
City of Hats Dead Drop

Messages that burn after reading.

Dead Drops are self-destructing encrypted messages. Send sensitive information that disappears permanently after retrieval — no copies, no cache, no trace.

  • Self-destructs after a single view — content is permanently erased
  • Optional PIN protection — only the intended recipient can open it
  • Time-locked delivery — set when the message becomes available
  • Anonymous retrieval — no account required to receive a Dead Drop
  • Server-side encrypted — even we cannot read the contents
City of Hats encrypted group channels

Private groups, same security.

Build encrypted group conversations with your team or your circle. Same end-to-end encryption as 1:1 channels — every member ratchets independently. No group admin keys, no metadata leaks, no cloud backups.

  • End-to-end encrypted multi-member channels
  • Per-member double ratchet — Signal-style forward secrecy
  • Invite-only via QR code or Hat ID — no phone numbers
  • Every Security Mode works inside groups (View Once, Recall, Sealed File, etc.)
  • Auto-Translate built in for multilingual teams
City of Hats Tease & Share — controlled blurred preview sharing

Controlled sharing, anywhere.

Drop a blurred preview into Facebook, iMessage, WhatsApp — anywhere. Recipients see only what you want them to. The full reveal stays inside City of Hats: encrypted, expiring, optionally PIN-locked or paid.

  • Blur the whole image, reveal a peek, or hide a single spot
  • Set expiry from 1 hour to never — your call
  • Optional PIN, view-once, or pay-to-unlock with Stripe
  • Branded social card with your custom on-image text
  • Watermark survives Facebook / iMessage / Telegram crops

9 security controls no other messenger offers

Every message and file you send comes with Security Modes — granular controls that keep the sender in charge.

#ModeDescription
1 View Once Self-destructs after a single view
2 Recall Pull it back anytime, even after delivery
3 Sealed File PIN-locked; share the code on your terms
4 Unlock Content Recipient pays to access
5 Verified Eyes Only Requires biometric face liveness verification
6 GeoLock Only viewable from an approved location
7 Voice Lock Recipient must pass voice verification
8 Hold to Reveal Must physically hold the screen to read
9 Certified Send Opens in a Protected Viewer with cryptographic proof of who opened it and when
1

View Once

Self-destructs after a single view

2

Recall

Pull it back anytime, even after delivery

3

Sealed File

PIN-locked; share the code on your terms

4

Unlock Content

Recipient pays to access

5

Verified Eyes Only

Requires biometric face liveness verification

6

GeoLock

Only viewable from an approved location

7

Voice Lock

Recipient must pass voice verification

8

Hold to Reveal

Must physically hold the screen to read

9

Certified Send

Opens in a Protected Viewer with cryptographic proof of who opened it and when

CHECK
> check email you@example.com
✓ 3 breaches found · risk: high
> check phone 0801110656
✓ carrier verified · no SIM swap
> check domain example.com
✓ 2 open ports · SSL valid
> check ip 8.8.8.8
✓ datacenter IP · no proxy
> check username johndoe
✓ found on 12 platforms
> check password test123
✓ exposed in 8 breaches

Cyber intelligence inside your conversations

No dashboard. No separate login. Just type a command in the chat.

What you get back

  • Risk scoring and exposure analysis
  • Credential detection across security databases
  • Carrier verification and SIM swap detection
  • IP reputation with VPN/proxy/Tor detection
  • Results delivered as self-destructing secure reports

Secure communication for sensitive business conversations

Financial Services

Banks, investors, and advisors sharing confidential documents and market-sensitive communications.

Legal & Compliance

Law firms protecting attorney-client privilege. Compliance teams handling sensitive investigations.

Healthcare

HIPAA-sensitive communications between providers, patients, and insurers.

Journalism & Sources

Reporters protecting sources with anonymous identities and burn-after-read messaging.

Encryption that protects you today and tomorrow

Double Ratchet Protocol

Forward secrecy — every message uses a unique key. Compromise one, the rest stay safe.

Post-Quantum Key Exchange

CRYSTALS-Kyber hybrid key exchange protects against future quantum computing threats.

AES-256-GCM

Military-grade symmetric encryption for every message, file, and call.

Zero-Knowledge Architecture

We cannot read your messages. No cloud backups. No metadata harvesting. No logs.

Start a secure conversation now

No sign-up required. No personal information needed. Just pick a Hat and start chatting.

Free forever. Premium features available.

Available on