Gologram
 
 
Gologram
Gologram
anonymous messenger with no phone number, no account, and no registration
Gologram
 
 
Should a confidential messenger know the phone numbers?

Gologram does not have access to the phone book and does not know the phone numbers. Gologram is a truly confidential messenger.

Gologram App

Install the Gologram app or use Gologram Web!

Elements of Gologram communication

Communicate in Public Channels, Secret Chats, or create Encrypted Notes
Gologram Public Channels
Public Channels

Open communication without registration, without an account, without censorship, without servers and only online.

Gologram Secret Chat
Secret Сhats

Secure communication without registration, without an account, end-to-end encryption with your key, without servers and only online.

Gologram Secret Notes
Encrypted Notes

Storing notes on the device in encrypted form, without registration, without an account, encrypted with your key, without servers.

Is it safe to register in the messenger, sync and log in to your account from any device?

There is no registration or synchronization in Gologram, and all saved chats can only be seen on your device if you save them. Gologram is a truly secure messenger.

FAQ

To start a Secret Chat, you need to:

1. Enter the same "Chat Name".
2. Enter the same "Encryption Key".
3. Chat together online to receive and send encrypted messages.

A Secret Chat is:

› Invented names without specifying phone numbers.
› Communication without servers is directly P2P and only online.
› Communication without registration, users are anonymous.
› Only those who are in a secret chat receive new messages.
› The message history is not forwarded to those logged into the secret chat.
› The encryption key is created by the user and stored only on his device.
› Encryption without exchanging encryption keys.
› Messages are stored only on the user's device.
› The visual encryption of each character is shown on the screen.
› The phone numbers and contacts of the users are unknown.
› There is no access to the gallery, camera, calendar, location, fingerprints, microphone, phone book and phone number.
› You can always see the number of participants and notifications about their entry and exit.

To create a Public Channel, you need to:

1. Enter any "Channel Name".
2. Enter any "Nickname".

A Public Channel is:

› Open communication for people all over the world.
› Communication without servers is direct and only online.
› Part of the message history is forwarded from the channel participants to the one who logged into the channel.
› Communication without registration, users are anonymous.
› The phone numbers and contacts of the users are unknown.
› An open communication channel without encryption, passwords and keys.
› The public channel is visible to everyone and is open for entry as long as there are free places in it.
› Messages are saved only on the user's device while he is in the public channel.
› By clicking on a user's nickname, you can block messages from them.

To create an Encrypted Note, you need to:

1. Enter any "Note Name".
2. Enter any "Encryption Key".

Encrypted Notes are:

› Encrypted storage is only on the user's device.
› The visual encryption of each character is shown on the screen.
› The encryption key is created by the user and stored only on his device.
› The encryption key cannot be restored.

To verify encryption and decryption, the user can enter an encryption key other than the correct one and make sure that the correct decryption does not occur.

Why Gologram?

Anonymity

Communicating in Public Channels, Secret Chats and storing Encrypted Notes without a phone number and without registration.

Your encryption

Using the encryption key created by the user with any phrase invented by him without the participation of the messenger.

Cryptoprotection

Using the encryption key created by the user with any phrase invented by him without the participation of the messenger.

Without servers

Storing the history of Secret Chats and Encrypted Notes only on the user's device without servers and without logs.

Is it safe when a messenger creates an encryption key for you and stores it on its server with your messages?

In Gologram, the user himself comes up with and creates an encryption key that is stored only on his device along with his messages. Any phrase invented by the user turns into his encryption key. Gologram does not use servers for communication and for storing messages or encryption keys. Gologram is an anonymous and secure messenger.

  • What is a Gologram?
    Gologram is a set of solutions for anonymous encrypted and public communication and for storing encrypted information, the only messenger in the world without registration for which the encryption key is created by the user himself.
  • How secure is Gologram?
    Gologram does not use mass encryption protocols with a public encryption key. The security of the encryption key depends only on the user who creates it himself. The longer and more complex the encryption key, the more time it takes to select this key. Gologram does not use any personal data and messages are transmitted in encrypted form directly between users without using a server and are not stored on it. Therefore, the database of users, contact numbers and messages cannot be leaked in Gologram. Any requests from the special services are meaningless since Gologram does not store anything and does not have a single server.
  • Who can I send a message to in a Secret Chat?You can write a message to people who know the name of the Secret Chat, the encryption key and are online with you in the same Secret Chat as you. The encryption key and the name of the Secret Chat must match completely so that you can communicate in the same Secret Chat.
  • What is the "chat name"?
    The chat name is a name that you have invented, which should be the same for users and can be any for different chats, it is not encrypted.
  • Why should I trust Gologram?
    Gologram is the only chat whose encryption you can check for yourself. In many mass messengers, it is impossible for the user to verify encryption, he has to trust the lock picture or some other symbols. In Gologram, you can always see an encrypted message before sending, you can check the encryption by entering different keys from the interlocutors in a Secret Chat or Encrypted Note and make sure that the correct decryption does not occur and users will not even be able to see each other in the same chat.  
  • Is a secure messenger supposed to collect meta-data about you and know all the phone numbers, to whom and at what time you called, the duration of the phone conversation?
    Gologram, unlike many messengers, does not collect any meta-data and does not even know your phone number.
  • Who can see me online?
    Only those who know the name of the Secret Chat, the encryption key and are online in the same Secret Chat can see whether you are online or not.
  • What is an "encryption key"?
    When creating a Secret Chat, you need to come up with and enter the same encryption key for all the interlocutors in the chat, for example, an altered text of some song, poem, or just a long phrase about the weather outside the window. To transfer the encryption key to the interlocutor, use a secure channel, but it is safest if you do it in person at the meeting.

Comparison of Gologram
with other messengers

Gologram Messenger

1. Without registration - anonymously.
A messenger without a phone number, without an e-mail, without an account.

2. Zero access to the phone.
Without access to the gallery, location, fingerprints, camera, microphone.

3. Without servers and metadata collection.
Storing messages on the user's device, communicating only directly without collecting metadata.

4. Own encryption key.
The encryption key is created by the user himself with any phrase without the participation of the messenger.

5. Secure storage of the encryption key.
The encryption key is stored only on the user's device and is not sent anywhere.

6. Visual encryption.
The visual encryption of each character is shown on the screen and encrypted with the key that the user created.

Many other messengers

1. With registration, it's not anonymous.
A phone number is specified or an account is created on the server.

2. Open access to the phone.
With access to the gallery, location, fingerprints, camera, microphone.

3. Metadata collection and storage.
Storing messages or collected user metadata on messenger servers.

4. Encryption with someone else's key.
To encrypt messages, an encryption key is used that was created by the application and not by the user.

5. The encryption key is being forwarded.
Part of the encryption key is sent over the Internet and possibly stored on the server along with the messages.

6. Blind encryption.
The user cannot verify how, when and with what his message is encrypted, or whether the message is encrypted at all before sending.

In the Gologram messenger:

  • It is unknown who is sending the message and it is unknown to whom.
    The phone numbers and contacts of the users are unknown. There is no registration and no account. There is no metadata collection.
  • It is unknown when the message was sent.
    Communication is only online, directly without a server, without saving messages and information about the message on the server.
  • It is unknown what is being sent in the message.
    The encryption key is not generated by the application, but is created by the user and stored only on the user's device. The encrypted message that is being sent is always shown on the screen before it is sent.

In many other messengers:

  • It is unknown who is sending the message and it is unknown to whom.
    The phone numbers and contacts of the users are unknown. There is no registration and no account. There is no metadata collection. 
  • It is unknown when the message was sent.
    Communication is only online, directly without a server, without saving messages and information about the message on the server. There are no servers.
  • It is unknown what is being sent in the message.
    The encryption key is not generated by the app, but is created by the user and stored only on the user's device. The encrypted message that is being sent is always shown on the screen before it is sent.

Encryption key combinations in Gologram

Users enter the same encryption key in Gologram before starting a Secret Chat. It can be any phrase with a length of 17 characters or more.


The number of possible options for selecting an encryption key is equal to the number of possible characters, taking into account the case and special characters (85 characters) to the extent equal to the key length.

For example, the number of possible options with a key length of 20 characters:
85^20 = 387 595 310 845 143 558 731 231 784 820 556 640 625

It's on 47 312 943 924 205 095 267 857 177 388 788 429 169 there are more options than a 128-bit encryption key:
2^128 = 340 282 366 920 938 463 463 374 607 431 768 211 456

In fact, if the length of the encryption key is unknown, then the number of possible options for selection will be many times greater. It will be equal to the number of variants of the minimum possible encryption key plus the number of variants of the next key, and so on.

For example, the number of encryption key variants with a length of 22 characters is equal to the number of key variants with a length of 17 characters plus the number of key variants with a length of 18 characters plus the number of key variants with a length of 19 characters and so on up to 22 characters.


Security of the Gologram encryption key

The computing power of the Fugaku supercomputer is 442 PFLOPS, which is 442,000,000,000,000,000 operations per second, which is 13,938,912,000,000,000,000,000,000 operations per year.


To calculate the time required to select all possible encryption key options, it is necessary to divide the number of encryption key options by the number of key selection operations:

With an encryption key length of 20 characters, it will take time to select:
18 938 448 940 047 152 570 772 365 588 108 157 982 763 646 976 : 13 938 912 000 000 000 000 000 000 = 1 358 674 833 448 059 114 712 years old. That is, it will take 1 sextillion years (1*10^21)

During the typing of each new character, it is encrypted with the encryption key entered by the user and turns into a long number that is displayed on the screen.

For example, the message "Hello!" it may look like this:

"8814679, 1446081, 3296180, 9237003, 4604864, 1416393"
Or so:
"2398077, 2718759, 7334764, 4583744, 1937319, 2571267"
or something else depending on the encryption key created by the user.

Therefore, it may take thousands of years on a supercomputer to decrypt a Gologram message.


What is Gologram?

  • Gologram is a messenger with notes.
  • Gologram is a messenger with encrypted notes.
  • Gologram is a messenger without an app.
  • Gologram is a messenger without a phone number.
  • Gologram is an encrypted messenger.
  • Gologram is a messenger with encryption.
  • Gologram is a messenger without registration.
  • Gologram is a messenger without a number.
  • Gologram is a messenger with end-to-end encryption.
  • Gologram is a messenger with end to end encryption.
  • Gologram is a messenger with a twist.
  • Gologram is a messenger without facebook.
  • Gologram is a messenger without fb.
  • Gologram is a messenger without facebook login.
  • Gologram is a messenger without a facebook account.