@ Anøm- Discretion and Privacy is Paramount

The app is disguised as a fully functional calculator on your home screen. No one can tell what is hidden beneath.

Access is granted through formula and fingerprint, which enforces two factor authentications.(2FA)

The formula + fingerprint is faster and more secure than a long password alone. A truly covert app

@ Anøm- Discretion and Privacy is Paramount

The app is disguised as a fully functional calculator on your home screen. No one can tell what is hidden beneath.

Access is granted through formula and fingerprint, which enforces two factor authentications.(2FA)

The formula + fingerprint is faster and more secure than a long password alone. A truly covert app

Could you decrypt messages, for example, if you were compelled to by law enforcement?

No!

We don't have the secret keys of our users, your secret key never leaves your device.

Our servers do need to know who is sending a message to whom, so that they can route it to the correct recipient, but we do not keep logs of this information. Further we cannot decrypt the messages contents.

Are messages encrypted when they are stored on my device?

Yes!

Anøm has its own specific encryption to protect stored messages, media and your AnømID's private key.

The key used for this encryption is generated randomly the first time you run Anøm.

What Data does Anøm store?

Using Anøm generates as little data on servers as possible – this is part of the concept, and our values.

For that reason, data like contacts or group chats are stored in a decentralized way on user devices, instead of on a the server. Our servers assume the role of a switch; messages and data get forwarded, but not permanently stored. Where there is no data, there is nothing to be accessed or misused.

However: without some kind of (temporary) data storage, there cannot be any asynchronous communication. In the following we will explain what kind of data we store, how we store it and for how long.

  • Messages and Cloaked Group chats: As soon as a message has been successfully delivered to the recipient(s), it is immediately deleted from the server. All messages and media are transmitted with end-to-end encryption. This means even if someone intercepted your message, it's useless. Only the intended recipient(s) are able to decrypt and read the message.
  • No contact lists are stored when synchronizing contacts: The email addresses and phone numbers from your address book get anonymized before they reach the server. Once the comparison is finished, they are immediately deleted from the server.
  • Key pairs are generated in a decentralized way on your device. Your private key is never known to us, and therefore we cannot decode any message contents.
  • Anøm doesn't log who is communicating with whom (what AnømID's are communicating).

What makes Anøm privacy protection so special?

Comprehensive privacy protection requires solid message encryption, but there is more to it.

Full anonymity

Anøm can be used without providing any personal information, whatsoever. Instead of a phone number, the AnomID serves as a unique identifier. Linking a phone number and/or email address to one’s AnomID is optional.

Metadata restraint

All data involved in communication other than the actual content is metadata. Serious privacy protection must include both protection of content and protection of metadata. The sole protection of content is insufficient because metadata allows to uniquely identify individuals, analyze their behavior, determine their circles of friends, detect their frequent locations, and monitor their communication behavior. Combined with data from other platforms, the picture that can be drawn of a person is much more detailed than one that could ever be drawn from message contents alone. It’s likely that many messengers are used to systematically collect and analyze users’ metadata. Threema, on the other hand, generates as little data as technically possible and only stores it as long as absolutely necessary.

The Anøm Superiority: To learn more about the differences between Anøm and other Apps in regard to privacy protection, please consult this comparison.

What is a Anøm ID?

In contrast to many other messengers, your identity in Anøm does not depend on a phone number. Each Anøm user gets a randomly generated, 8 digit Anøm ID when starting the app for the first time. This ID is your unique address in Anøm and makes it possible to use Anøm completely anonymously, without disclosing any personal information.

Your Anøm ID is just one of two components that make up your identity in Anøm. The other one is the so called key pair (consisting of a public key and a private key) which is essential for the encryption. Your Anøm ID is permanently tied to your public key. While the public key is sent to Anøm's servers to be distributed to your chat partners, the private key remains on your device where it is securely stored. All messages directed to you will be individually encrypted with your public key on the sender's device. They can only be decrypted with your personal private key.

What Encryption Ciphers are Used?

Anøm utilises 3 layers of encryption:


Stage 1. OMEMO Double Ratchet Algorithm is used for End to End Encryption (E2EE) for all transmitted data.
- Standardized by the XMPP Standards Foundation & Independently audited by Dutch security research group Radically Open Security.

Stage 2. AES-256-CBC + Argon2 is used for file-based encryption, the latter for PIN verification.- Argon2 is the winner of the Password Hashing Competition 2015 and provides best in class defense against brute-force attacks.
Stage 3. AES-256-XTS is used for full disk encryption at a file-system level, covering all data on the device.