Privacy-first encrypted messaging

Encrypted messaging that hides in plain sight.

Layergram lets you send end‑to‑end encrypted messages over WhatsApp, Telegram, Signal, SMS, email, or any text‑based app – using invisible Unicode characters.

Fully local encryptionZero serversTransport agnostic42 languages
Get it fromMicrosoft Store View onGitHub
The dual reality in action — Layergram lets you write a cover message the world sees and a secret message only the recipient reads, two messages in one interface

How it works

01

Encrypt

Layergram encrypts your message end‑to‑end using modern cryptography (X25519 + AES‑GCM).

02

Encode & Obfuscate

The raw encrypted bytes are mixed with random noise and encoded into zero‑width Unicode characters, then interleaved into a normal cover message.

03

Send

You paste and send that text via any messaging app. Only Layergram clients with the right keys can trial-decrypt and reveal the hidden message.

Transport-agnostic by design. Works over: WhatsApp, Telegram, Signal, iMessage, SMS, Email, Forums, and more.

Layergram overview Message received in any messaging app Layergram decoded message revealed

Total privacy in 5 taps.

3 taps to share an encrypted message from Layergram directly to a contact in your favorite chat app. 2 taps to share a received message back to Layergram and reveal the hidden payload. No manual copy-pasting of ciphertexts required.

Supported platforms

Official Layergram releases are available on mobile and desktop. Linux remains source-build friendly, and web is intentionally not distributed in this release.

Android

Ready

Official release

iOS

Ready

Official release

macOS

Ready

Official release

Windows

Ready

Official release

Linux

Build from source

Compilable from source

Web

Not distributed

Not distributed in this release

Why Layergram

End‑to‑end encryption, independent of any platform

Your privacy shouldn't depend on the transport layer's promises. Keys never leave your device.

Visual deniability for your messages

To the human eye, your communication looks like standard text. While automated analysis can detect zero-width characters, casual observers only see an innocent conversation.

Works across multiple messengers and devices

Use the same encryption standard whether you are sending an SMS or posting on a public forum.

No central routing servers

We don't operate servers to route your messages. You leverage the platforms you already use, eliminating a single point of failure.

Anonymous by default

Layergram does not require a phone number or email address. Your identity is simply a locally generated cryptographic key.

Open‑core: protocol and core logic are open‑source

Auditable security. The cryptography and message format are completely open for review.

Security & Privacy

For your eyes only.

Layergram is built to protect your most sensitive daily communications. With built-in anti-screenshot protection and biometric/PIN locks, your secrets stay safe. Furthermore, thanks to steganography, underlying transport apps cannot read your hidden payload. Layergram's signature-less encoding ensures the data remains mathematically indistinguishable from random noise.

Cryptography

  • X25519 key agreement
  • HKDF‑SHA256 key derivation
  • AES‑GCM‑256 encryption

Steganography

  • Zero‑width Unicode runes with random noise injection
  • Signature-less binary payloads
  • Robust to aggressive platform sanitization
  • Mathematically distributed between visible characters

Note: Your private keys never leave your device. There is no central Layergram server that can read, route, or intercept your messages.

Read the Layergram Message Format (LMF) spec →

Identity & Plausible Deniability

The Lost Key Alibi (Advanced)

An optional feature for extreme privacy. Set an expellable passphrase to unlock completely hidden identities. If forced to hand over your device, hidden messages remain mathematically indistinguishable from abandoned data.

Learn how Plausible Deniability works

BIP39 Seed Phrase Backups

Your private keys are yours alone. Back them up securely using a standard sequence of words (BIP39).

Open-source app, clear boundaries

This public repository contains the official Layergram Flutter app, the Layergram Message Format specification, and the local encryption, identity, steganography, and storage logic.

GitHub organization Read the Layergram Message Format (LMF) spec

Available in 42 Languages

EnglishItalianoEspañolPortuguês (Brasil)Português (Portugal)РусскийBahasa IndonesiaالعربيةFrançaisDeutschहिन्दीNederlandsفارسیRomânăPolski中文(繁體)Türkçe日本語한국어Tiếng ViệtภาษาไทยΕλληνικάবাংলাमराठीاردوSuomiNorskSvenskaУкраїнськаShqipCatalàKiswahiliHausaFilipinoBahasa Melayuதமிழ்తెలుగుગુજરાતીಕನ್ನಡਪੰਜਾਬੀአማርኛYorùbá

Download Layergram

Mobile

Desktop

Get it fromMicrosoft Store

Download Android APKs from the official site

FAQ

Is Layergram a new messenger?

No. It is an encryption layer that uses your existing messengers as the transport medium.

Can platforms detect my hidden messages?

Automated filters can detect invisible characters. However, Layergram uses signature-less binary payloads combined with random noise injection. The hidden data is mathematically indistinguishable from random noise.

Does Layergram run a central server?

No. Keys remain entirely local on your device. You use existing networks to send messages and they cannot access your keys.

Can you recover my 24-word recovery key if I lose it?

No. Your 24-word recovery key is private, secret, and never leaves your control. We do not store it, we cannot recover it, and you should never share it with anyone. Layergram will never ask you to send it.

Why can't I find the "Share" button on Android?

Because of Android platform limitations, Layergram cannot reliably pass the complete message package (cover text plus hidden secret) directly to another app. You can still use Copy and paste it into the destination app. We are evaluating better options for future releases.

Can I use the same identity on multiple devices?

Yes. Import the same recovery key on each device to use the same identity for sending and receiving messages. Messages themselves are not synced between devices, so each device keeps its own local history.

×