The Truth About Your Messages

Your messages aren't
as private as you think

End-to-end encryption is just a marketing checkbox. The apps you trust still harvest your metadata, hand it to governments, and leave you vulnerable to spyware that bypasses encryption entirely.

78%
of law enforcement requests
fulfilled by popular messengers
675%
surge in user accounts shared
with US law enforcement
51+
countries targeted by
commercial spyware
0
data points Backspace.me
can hand over

Six ways your "private" messages are exposed

Encryption protects content. Everything else is still wide open.

📊

Metadata Harvesting

Even with E2E encryption, apps collect who you talk to, when, how often, from where, your contacts, device info, and IP address. This metadata alone reconstructs your entire social graph.

The world's most popular encrypted messenger delivers metadata to law enforcement every 15 minutes in real-time
🏛

Government Access

Centralized platforms are legally compelled to hand over data. Major social media corporations disclosed data for 78% of law enforcement requests in 2024. Some retain message metadata for 30 days.

675% surge in user accounts shared with US law enforcement since 2014
🕷

Spyware Attacks

Commercial spyware like Pegasus compromised 1,400+ devices via a messaging app zero-day — a single phone call was enough. Spyware bypasses encryption entirely by compromising the device itself.

Pegasus deployed across 51 countries — targeting journalists, activists, and heads of state
🚫

State-Level Blocking

Some governments block encrypted VoIP calls on every major platform. If they can't monitor your conversations, they simply prevent them — forcing users onto state-approved, surveilled alternatives.

VPN circumvention fines reach up to $545,000 in certain countries
🤖

AI Surveillance

AI meeting assistants convert encrypted voice into stored, searchable text — neutralizing encryption. One leading transcription tool was sued in 2025 for secretly recording millions of meetings without consent.

25 million users, 1 billion+ meetings processed by a single AI tool
🔓

Backdoor Demands

The UK demanded a major tech company build backdoor access to all encrypted cloud data worldwide. The EU's Chat Control proposal targets client-side scanning of all encrypted messages. Backdoors built for one government get exploited by others.

Salt Typhoon: Foreign hackers exploited US government-mandated wiretapping systems at 9 major telecoms

The truth about today's messaging apps

What they promise vs. what they actually do — by category.

Ad-Funded "Encrypted" Messengers
Privacy Theater
  • Encrypt message content but harvest all metadata — contacts, IP, device info, who you talk to, when, how often
  • Some deliver metadata to law enforcement every 15 minutes via pen register orders
  • Major platforms disclosed data for 78% of law enforcement requests in 2024
  • Require phone numbers — your real identity is always attached to your account
  • Spyware vendors exploit zero-day vulnerabilities in these apps to deploy surveillance malware
  • Advertising business model means your data is the product — even if message content is encrypted
Cloud-Based Messengers
Not Actually Encrypted
  • Many do NOT enable E2E encryption by default — the vast majority of chats use only server-side encryption
  • The platform holds encryption keys and stores all standard messages on its servers indefinitely
  • Proprietary encryption protocols — insufficiently audited, criticized by cryptographers
  • E2E "secret chats" are often limited to 1-on-1 conversations only — no group encryption
  • Some reversed their "zero data disclosed" policies after founder arrests — now share IPs and phone numbers with authorities
  • Investigations have revealed ties between platform infrastructure and state intelligence agencies
Social Media Messengers
Data Vacuum
  • Collect the most data of any messaging category — contacts, location, browsing history, Wi-Fi networks, device IDs
  • Some only added default E2E encryption in late 2023 — years behind the industry
  • 675% surge in user accounts shared with US law enforcement between 2014-2024
  • Deep integration with advertising ecosystems — your conversations feed ad targeting algorithms
  • Real-name social accounts required — your full identity is linked to everything you say
Built-In Phone Messengers
Partial Protection
  • E2E encrypted by default, but retain metadata including timestamps and routing info for up to 30 days
  • Law enforcement can obtain 25+ days of message lookup data showing who contacted whom
  • Governments have demanded backdoor access to encrypted cloud backups — worldwide
  • Ecosystem lock-in means they only work between devices from the same manufacturer
  • Cloud backups are not always E2E encrypted — advanced protection features are opt-in, not default
State-Linked Super Apps
Total Surveillance
  • Zero end-to-end encryption — human rights organizations have scored some 0 out of 100 for encryption
  • All conversations stored on servers for months — deleted chats can be retrieved by the platform
  • Monitors both domestic and international accounts to feed government censorship systems
  • Researchers have discovered databases of over 1 billion conversations including GPS coordinates and national IDs
  • Surveillance is "functionally undetectable" for users — you'd never know you're being monitored
Privacy-Focused Centralized Apps
Best Centralized Option
  • The best centralized apps store only 2 data points: account creation and last connection timestamp
  • Advanced features hide even sender identity from the platform's own servers
  • Fully open-source, independently audited, nonprofit with no advertising model
  • First to deploy post-quantum encryption protocols for future-proof security
  • Still centralized — still require phone numbers, still depend on a single organization's infrastructure
  • Governments have threatened legislation that would force client-side scanning — the best apps threatened to leave entire regions rather than comply

How Backspace.me compares

A feature-by-feature look at what actually protects you.

Feature Popular Encrypted
Messengers
Cloud-Based
Messengers
Privacy-Focused
Apps
Built-In Phone
Messengers
Backspace.me
E2E Encryption (Default) Yes No Yes Yes Yes
No Metadata Collection No No Minimal No Yes
No Phone Number Required No No No No Yes
No Email / Account Required No No Email optional No Yes
Decentralized / P2P No No No No Yes
No Central Server Storage No No Minimal No Yes
Messages Auto-Expire Optional Secret mode Optional No 7-Day TTL
Fully Open Source No Partial Yes No Yes
No Advertising Model Ad-funded Ads/Premium Nonprofit Hardware lock-in None
Can't Comply with Subpoenas Complies Complies Minimal data Complies Nothing to give
Built-in Crypto Wallet No Limited No No SOL / TRX / USDT
Built-in Games & Tournaments No Bots No No Arcade + Real $
Built-in Music Player No No No No Full Player + DJ

When governments can't spy, they block

Some countries block encrypted communication entirely — forcing citizens onto state-approved, surveilled alternatives.

$16.1B

Telecom Revenue Protected

Government-owned telecoms earn billions annually. Free encrypted VoIP calls threaten this cash flow, giving states a financial incentive to block them.

88%

Expatriate Population Affected

In some countries, the vast majority of residents are migrant workers. They're forced to pay for surveilled calling apps or lose contact with family.

$545K

VPN Circumvention Fines

Using a VPN to access blocked services can carry fines in the hundreds of thousands. The line between "legitimate" and "circumvention" is deliberately vague.

28/100

Freedom House Score

Countries blocking VoIP score "Not Free" — authorities openly monitor 42+ social media platforms. All websites and profiles are tracked.

🕵

Hired NSA Hackers

Some governments recruited former NSA operatives to hack phones of activists, journalists, and foreign leaders. Multiple charged by the US DOJ.

📱

Fake "Free" VoIP Apps

Governments have promoted free calling apps that were later exposed as mass surveillance tools built by intelligence-linked organizations.

"They exploited the wiretapping system that our law enforcement agencies rely on."

— US Senator, on the Salt Typhoon breach where foreign state hackers exploited government-mandated backdoors at 9 major telecoms — the most powerful real-world argument against building backdoors into communications infrastructure.

A timeline of broken promises

Every major platform type has been breached, hacked, or caught lying about privacy.

2019
Messaging App / Pegasus Spyware

NSO Group deployed Pegasus on 1,400+ devices across 51 countries via a popular messenger's zero-day vulnerability — a single phone call was enough, even unanswered.

2019
Super App Database Exposed

Researchers discovered a database of 1 billion+ conversations from a major messaging platform, including 3.7 million messages tagged with GPS coordinates and national IDs.

2020
Video Platform's Encryption Lie

A major video conferencing platform falsely marketed "end-to-end encryption" for 4 years while using transport encryption — servers maintained access to keys. FTC settlement required 20 years of oversight.

2024
Salt Typhoon / US Telecoms

Foreign state hackers exploited government-mandated wiretapping systems at 9 major US telecommunications providers — described as the worst telecom breach in US history.

2024
Cloud Messenger Policy Reversal

After its founder was arrested in Europe, a major cloud messenger reversed its "zero data disclosed" policy — now shares IP addresses and phone numbers with authorities.

2025
Government Archiving Tool Breach

Modified versions of popular encrypted messengers — used by 60+ US government agencies for regulatory archiving — were hacked in under 30 minutes, exposing messages in plaintext from FEMA, Secret Service, and White House staff.

2025
New Zero-Click Spyware Campaign

A second commercial spyware vendor deployed zero-click attacks on a popular messenger, targeting 90 journalists and civil society members across Europe. The US government later contracted the spyware maker.

2025
Government Backdoor Demand

A government demanded a major tech company build blanket backdoor access to all encrypted cloud data worldwide. The company disabled the encryption feature for that country's users rather than comply.

How Backspace.me is structurally different

Not better policies — better architecture. You can't hand over data that doesn't exist.

🌐

Decentralized P2P Network

No central server stores your messages. A growing mesh of relay nodes worldwide means there's no single point of failure, no central database to hack, and no company to subpoena.

🔒

E2E Encryption by Default

Every message encrypted with Ed25519 + AES-256-GCM before it leaves your device. Not even relay nodes can read your conversations. No opt-in required — it's always on.

👻

Zero Metadata Collection

No IP logging. No contact lists. No usage patterns. No analytics. Messages are relayed and forgotten. There's nothing to harvest, sell, or hand to law enforcement.

🎭

No Identity Requirements

No phone number. No email. No real name. Mint a cryptographic username on the network — your identity is a key pair, not a government ID.

Messages Auto-Expire

7-day TTL on all messages by design. No permanent archives, no backup databases, no "deleted messages" that can be retrieved. When they're gone, they're gone.

💰

No Advertising Model

No ads. No data monetization. No investors demanding growth metrics. The network is sustained by its users — not by selling your behavior to the highest bidder.

"It's impossible to turn over data we never had access to in the first place."

— A leading privacy-focused messenger's response to a grand jury subpoena. Backspace.me takes this further: with no central servers, there's no one to subpoena at all.

The most important privacy decision
isn't which app to choose.
It's understanding what your app
actually protects.

Encryption is necessary but not sufficient. Only a decentralized, zero-knowledge architecture eliminates the metadata, the subpoenas, the backdoors, and the single points of failure that centralized platforms will always be vulnerable to.

Ready for actual privacy?

No registration. No phone number. No tracking. No compromise. Just encrypted, decentralized messaging.