Keep your apps — WhatsApp, Telegram, Signal, iMessage, Email, any social network. Protect what matters. Send with more discretion. Not every message needs it. The important ones do.
Your message is encrypted locally using modern cryptography (X25519 + AES‑GCM).
The encrypted data is encoded into invisible characters and placed within a normal message you write.
Paste and send via any app you already use. Only the recipient with the right keys can read the hidden content.
Works with what you already have: WhatsApp, Telegram, Signal, iMessage, Email, and more.
Share encrypted messages to any app in a few taps. Receive and decrypt just as easily. The channel stays the same. The exposure does not have to.
Official Layergram releases are available on mobile and desktop. Linux remains source-build friendly, and web is intentionally not distributed in this release.
Official release
Official release
Official release
Official release
Compilable from source
Not distributed in this release
No accounts. No servers. Just local encryption that keeps your sensitive messages private, independent of whatever app you use to send them.
Continue using WhatsApp, Telegram, Signal, iMessage, or any app you already use. Layergram adds a layer of privacy without asking you to change how you communicate.
Keys are generated and stay on your device. There is no server that can be compromised, no database to leak, no account to hack.
When discretion matters. For the messages you do not treat lightly. For the moments that deserve more than ordinary privacy.
Optional passphrase-protected identities can remain hidden. Under casual inspection, they are mathematically indistinguishable from abandoned data.
Core protocol and cryptography are open-source. Plain, auditable choices: X25519, AES-GCM-256, HKDF-SHA256. No exotic tricks.
Your keys never leave your device. Biometric locks and anti-screenshot protection keep your sensitive messages for your eyes only. When the channel stays the same, the exposure does not have to.
Note: No accounts. No servers. Just local encryption. Your keys stay on your device. We cannot read your messages even if we wanted to.
Read the Layergram Message Format spec →Optional passphrase-protected identities can be kept completely separate. Without the passphrase, they remain mathematically indistinguishable from abandoned data.
Learn how plausible deniability works
Back up your private keys with a standard BIP39 seed phrase. Yours alone. Recoverable anywhere, shared with no one.
This public repository contains the official Layergram Flutter app, the Layergram Message Format specification, and the local encryption, identity, steganography, and storage logic.
Is Layergram a new messaging app?
No. It is an encryption layer for your existing apps. Keep using WhatsApp, Telegram, Signal, iMessage, or email. Layergram adds privacy without changing your habits.
Can platforms detect hidden messages?
Automated filters can detect invisible characters. Layergram uses signature-less payloads with random noise, so the data appears as random bytes. A motivated analyst can detect hidden data, but cannot read it without your keys.
Does Layergram have servers?
No. No accounts, no servers, no backend. Your keys stay on your device. We cannot be compelled to hand over data we never have.
What if I lose my recovery phrase?
We cannot recover it. Your 24-word phrase is yours alone. We never store it, cannot access it, and will never ask you to share it. Keep it safe.
Can I use the same identity on multiple devices?
Yes. Import the same recovery phrase on each device. Messages stay local to each device—they are not synced between them.
If a messaging app rejects my cover message, does that mean I cannot use Layergram through it?
You can skip the visual cover entirely and send your message in link mode: it is plain text and works in any app that accepts enough characters. Doing so makes it visible to an outside observer that you are using Layergram, but the content of your message remains fully private.