R V N T

Messages. Payments. Files. Private.

No phone number. No server. No compromise.

Messages

End-to-end encrypted with post-quantum cryptography. No phone number required. No server ever sees your messages. Messages are delivered directly between devices.

Payments

Private transfers to your contacts. No payment processor sees who paid whom. Payments route through the same encrypted channel as your messages.

Files

Encrypted direct transfers up to any size. EXIF metadata stripped automatically. Distributed storage across the network. AirDrop without the cloud.

Your Messages Never Touch Our Servers

When you send a message, it is encrypted on your device using the Double Ratchet algorithm with post-quantum ML-KEM-768 key exchange. The ciphertext routes through the Tor anonymity network — three privacy layers minimum — and arrives directly at your contact's device.

Our servers help devices find each other. They never see message content, sender identity, recipient identity, or metadata. They cannot be compelled to hand over what they do not have.

View full protocol specification

The Numbers

522+ tests passing
91.6% test coverage
226M+ fuzz runs, zero crashes
ML-KEM-768 post-quantum since day one

Every Line Is Public

RVNT's cryptographic implementation, network layer, and server infrastructure are open source. You do not have to trust us. You can read it, run it, audit it, and build it yourself.

What RVNT Protects Against

  • A server being compromised — we have nothing to give
  • Traffic analysis of your messages — Tor + mixnet
  • Future quantum computers — ML-KEM-768 key exchange
  • Metadata correlation — sealed sender, cover traffic
  • Physical device seizure — SQLCipher encryption, panic mode
  • Border crossing — travel mode (duress PIN)

What RVNT Does Not Protect Against

  • A compromised device (if your phone has malware, RVNT cannot protect you)
  • Someone reading over your shoulder
  • A contact who screenshots or forwards your messages
  • Legal orders served to your contacts
  • Global network surveillance with AI pattern matching

An app that honestly describes its limitations is more trustworthy than one that claims to solve everything.

Full threat model