For the messages that deserve more than ordinary privacy

For the messages that deserve more than ordinary privacy.

Keep your apps — WhatsApp, Telegram, Signal, iMessage, Email, any social network. Protect what matters. Send with more discretion. Not every message needs it. The important ones do.

No accountsNo serversKeep your appsLocal encryption
The dual reality in action — Layergram lets you write a cover message the world sees and a secret message only the recipient reads, two messages in one interface

How it works

Getting Started →
01

Encrypt

Your message is encrypted locally using modern cryptography (X25519 + AES‑GCM).

02

Hide

The encrypted data is encoded into invisible characters and placed within a normal message you write.

03

Send

Paste and send via any app you already use. Only the recipient with the right keys can read the hidden content.

Works with what you already have: WhatsApp, Telegram, Signal, iMessage, Email, and more.

Layergram overview Message received in any messaging app Layergram decoded message revealed

A quieter way to protect sensitive messages.

Share encrypted messages to any app in a few taps. Receive and decrypt just as easily. The channel stays the same. The exposure does not have to.

Supported platforms

Official Layergram releases are available on mobile and desktop. Linux remains source-build friendly, and web is intentionally not distributed in this release.

Android

Ready

Official release

iOS

Ready

Official release

macOS

Ready

Official release

Windows

Ready

Official release

Linux

Build from source

Compilable from source

Web

Not distributed

Not distributed in this release

Why Layergram

Protection where it counts

No accounts. No servers. Just local encryption that keeps your sensitive messages private, independent of whatever app you use to send them.

Keep your apps

Continue using WhatsApp, Telegram, Signal, iMessage, or any app you already use. Layergram adds a layer of privacy without asking you to change how you communicate.

Private by design, local by nature

Keys are generated and stay on your device. There is no server that can be compromised, no database to leak, no account to hack.

For conversations better kept closer

When discretion matters. For the messages you do not treat lightly. For the moments that deserve more than ordinary privacy.

Plausible deniability when needed

Optional passphrase-protected identities can remain hidden. Under casual inspection, they are mathematically indistinguishable from abandoned data.

Open for review

Core protocol and cryptography are open-source. Plain, auditable choices: X25519, AES-GCM-256, HKDF-SHA256. No exotic tricks.

New to Layergram?

Find out when it really makes a difference — and get started in minutes.

How protection works

Private by design, local by nature.

Your keys never leave your device. Biometric locks and anti-screenshot protection keep your sensitive messages for your eyes only. When the channel stays the same, the exposure does not have to.

Cryptography

  • X25519 key agreement
  • HKDF‑SHA256 key derivation
  • AES‑GCM‑256 encryption

Encoding

  • Zero‑width Unicode characters with random noise
  • Signature-less payloads carry no sender info
  • Resilient to platform text processing
  • Attribution only possible with private keys

Note: No accounts. No servers. Just local encryption. Your keys stay on your device. We cannot read your messages even if we wanted to.

Read the Layergram Message Format spec →

Identity & Plausible Deniability

When you need an alibi

Optional passphrase-protected identities can be kept completely separate. Without the passphrase, they remain mathematically indistinguishable from abandoned data.

Learn how plausible deniability works

Your keys, your words

Back up your private keys with a standard BIP39 seed phrase. Yours alone. Recoverable anywhere, shared with no one.

Open-source app, clear boundaries

This public repository contains the official Layergram Flutter app, the Layergram Message Format specification, and the local encryption, identity, steganography, and storage logic.

GitHub organization Read the Layergram Message Format spec

Available in 42 Languages

EnglishItalianoEspañolPortuguês (Brasil)Português (Portugal)РусскийBahasa IndonesiaالعربيةFrançaisDeutschहिन्दीNederlandsفارسیRomânăPolski中文(繁體)Türkçe日本語한국어Tiếng ViệtภาษาไทยΕλληνικάবাংলাमराठीاردوSuomiNorskSvenskaУкраїнськаShqipCatalàKiswahiliHausaFilipinoBahasa Melayuதமிழ்తెలుగుગુજરાતીಕನ್ನಡਪੰਜਾਬੀአማርኛYorùbá

Get Layergram

Desktop

Download formacOS Get it fromMicrosoft Store

Download Android APKs from the official site

FAQ

Is Layergram a new messaging app?

No. It is an encryption layer for your existing apps. Keep using WhatsApp, Telegram, Signal, iMessage, or email. Layergram adds privacy without changing your habits.

Can platforms detect hidden messages?

Automated filters can detect invisible characters. Layergram uses signature-less payloads with random noise, so the data appears as random bytes. A motivated analyst can detect hidden data, but cannot read it without your keys.

Does Layergram have servers?

No. No accounts, no servers, no backend. Your keys stay on your device. We cannot be compelled to hand over data we never have.

What if I lose my recovery phrase?

We cannot recover it. Your 24-word phrase is yours alone. We never store it, cannot access it, and will never ask you to share it. Keep it safe.

Can I use the same identity on multiple devices?

Yes. Import the same recovery phrase on each device. Messages stay local to each device—they are not synced between them.

If a messaging app rejects my cover message, does that mean I cannot use Layergram through it?

You can skip the visual cover entirely and send your message in link mode: it is plain text and works in any app that accepts enough characters. Doing so makes it visible to an outside observer that you are using Layergram, but the content of your message remains fully private.

×