SMS
Your carrier logs who you text and when — retained anywhere from 60 days to 7 years. In the US, law enforcement can pull that metadata with a subpoena, no warrant required.
Source: ACLU / DOJ retention chart →Work in progress — proof of concept verified. The v1 specification and reference apps are being prepared.
How every mainstream messenger leaks your data, why the EU's Chat Control breaks them all, and what Priver's architecture does differently. Every claim on this page is sourced.
Already read, or readable tomorrow. Not maybe. Not possibly. Certainly.
Your carrier logs who you text and when — retained anywhere from 60 days to 7 years. In the US, law enforcement can pull that metadata with a subpoena, no warrant required.
Source: ACLU / DOJ retention chart →Google stopped scanning Gmail for ad targeting in 2017 — but their systems still process every message for spam filtering, search, and Smart Compose. Microsoft does the same. Indexed. Retained. Readable.
Source: NPR (2017) →Owned by Meta. Message bodies are end-to-end encrypted — but a leaked 2021 FBI document shows WhatsApp hands over metadata in near real time: who you talk to, when, and your address book. And Meta sells attention for a living.
Source: Rolling Stone / leaked FBI doc →Not end-to-end encrypted by default. Cloud chats sit on Telegram's servers — encrypted, but with keys Telegram holds. After their CEO's arrest in France (2024), Telegram now hands IP addresses and phone numbers to law enforcement on valid legal requests.
Source: CNN →Backed up to iCloud by default — where Apple holds the keys and can hand it over. "Advanced Data Protection" (opt-in since Dec 2022) closes this gap, but most users never enable it.
Source: Apple iCloud data security overview →The gold standard — until now. Still relies on centralized servers. Still requires a phone number to register. Those servers can be subpoenaed; Signal publishes every request it receives. And there's a new threat coming.
Source: signal.org/bigbrother →Doesn't require a phone number, apps are open source — good. But still runs on centralized servers in Switzerland. Still a company. Still a single point that can be compelled, hacked, or shut down.
Source: Threema (open source) →End-to-end encrypted, open source — but stores your contact graph on their servers. Metadata is exposed. Wire is a company with investors, meaning it answers to someone.
Source: Wikipedia / Motherboard (contact graph) →Genuinely P2P, genuinely private. Android and desktop (Linux, Windows, macOS). No iOS, and the developers say none is planned. A tool for the few, not the many.
Source: Briar download page →The pattern is clear. Every messenger you've heard of has a server. Every server has an owner. Every owner can be forced.
The proposed EU "CSA Regulation" — widely known as Chat Control — would require every messaging platform operating in Europe, including Signal, WhatsApp, iMessage and Telegram, to scan private messages for prohibited content. Negotiations between EU institutions are ongoing into 2026.
Current status: Chat Control 1.0's voluntary-scanning derogation expired 3 April 2026. Chat Control 2.0 remains under trilogue negotiation. Background (Patrick Breyer MEP) →
Which leaves you with nothing.
Unless you have Priver.
Not "we promise we don't look." Not "trust us." Not "we're a nonprofit."
There is no server to subpoena.
There is no company that holds your data.
There is no one to comply — because there is no one in between.
Your identity is a cryptographic key pair generated on your device. Nobody issues it. Nobody can revoke it. Nobody knows it exists.
Messages travel directly from your device to theirs — through Tor, which hides your IP, your location, and the fact that you're communicating at all.
The same Double Ratchet algorithm used by Signal — but without Signal's servers. Every message gets a unique key. Past messages stay safe even if your device is compromised today.
Finding another Priver user doesn't require a directory. It uses a distributed hash table — the same technology that powers BitTorrent — with no central point that can be shut down or seized.
Every line of code is public. Any researcher, security expert, or curious developer can verify exactly what Priver does and doesn't do. No black boxes. No trust required.
Privacy isn't a marketing claim — it's the architecture. Take any link out and the system still respects you.
| Capability | SMS | Telegram | Signal | Threema | Wire | Briar | Priver | ||
|---|---|---|---|---|---|---|---|---|---|
| End-to-end encrypted | ✕ | ✕ | ✓ | ! | ✓ | ✓ | ✓ | ✓ | ✓ |
| No central servers | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ |
| No phone number required | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ | ✓ | ✓ |
| IP address hidden | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ |
| iOS + Android support | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✕ | ✓ |
| Cannot comply with Chat Control | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ |
| Open source protocol | ✕ | ✓ | ✕ | ✕ | ✓ | ✕ | ✓ | ✓ | ✓ |
| Self-hostable | ✕ | ✓ | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ |
! Telegram is end-to-end encrypted only in opt-in "Secret Chats" — not by default.
The open standard. Published under an open license. Anyone can implement it, audit it, build on it. A communication protocol designed for the post-Chat-Control world.
The reference implementation. Available for iOS, Android, and desktop. Simple enough for anyone. Secure enough for everyone.
The self-hosted bridge for iOS push notifications. Because Apple requires a server to wake up sleeping apps — we made it open source, federated, and operated by the community. You can run your own. The gateway never sees your messages. It only knocks on the door.
Journalists
protecting sources.
Lawyers
communicating with clients.
Activists
organizing in countries that criminalize dissent.
Businesses
discussing deals that can't leak.
Families
who just want to talk without being a product.
And everyone in between. Privacy isn't a feature for the paranoid. It's a right for everyone.
Priver is a protocol, not a platform. Like email, like HTTP, like TCP/IP — it doesn't belong to anyone. It can't be bought, shut down, or forced to comply.
The specification is public. The code is open. The network is distributed.
If Jetlio disappeared tomorrow, Priver would continue. Other developers would build clients. Other operators would run gateways. The protocol lives independently of the organization that created it.
That's the point.
Download Priver for iOS, Android, or desktop. Or read the protocol specification.
Developed by Jetlio. Owned by no one.