Its a messages & data exchange application that runs on it's own operating system, that can run on multiple hardware architectures, i.e. multiple desktop computers, laptops, phones or in a data centers at home, office or any cloud based infrastructure. The program which you can install on any usb drive (flash-drive, HDD, SSD) and launch it on any compatible hardware/computer. See PRICING page for suitable pack, terms and conditions.
No personal information is required. Simply create a random username and password to access our federated messaging network. We do not engage in fingerprinting or use metadata in any way.
Gospl-Chat was designed to run on an operating system that operates nothing but Gospl-Chat itself, facilitating communication and data transmission strictly peer-to-peer. However, at your own risk, you may run our app on the platform of your choice if you trust that platform. No hay problema.
Security through obscurity is not the main approach we have chosen. Nevertheless, we decided to include it as an additional layer of security. The critical parts of the application will not be open-sourced or revealed. One of our FAQ responses addresses the relevant question: 'Where is the guarantee that the exact code is deployed to the servers without any modifications or that it remains close to the source code version?'
We employ other security techniques that include hiding fingerprints, incorporating kill switches, and many more. Once you join our club, you will have the opportunity to familiarize yourself with these in the app’s one-page manual.
Due to the absence of centralized control, the peer-to-peer approach can offer greater privacy for our users.
We use ECDH, AES256, GCM, CBC, and RSA algorithms and protocols in GOSPL protocol, just like some other messengers out there. BUT, once again, what makes you so confident that your encrypted chat is secure when you have little to no control over the operating system and the processes running on your computer or mobile device, and moreover, when the encryption keys are not in your possession?
We decided to implement encryption at every stage and for all data, whether at rest or in transit. Imagine an encrypted block of data with encrypted headers traveling through an encrypted VPN tunnel to encrypted storage (if chosen to be stored) on an encrypted volume of the operating system. Additionally, one can encrypt the USB drive itself if the drive supports it.
Why did we do this? Because we can. We carefully selected the right tools that allowed us to build the core engine this way without sacrificing the application's performance.
Encrypted data traffic travels peer-to-peer (that is, from participant to participant) through secure VPN tunnels of your choice, which may be self-hosted or rented, on-premise, or in the cloud.
We encrypt your data with the most secure algorithms and transfer it from peer to peer. However, you will have the option to securely store your data on your site or device at your discretion.
Literally, we don't want to know it. We'll instruct you on how to store and recover it more effectively. Otherwise, we'll have to register a new bundle, and your previous one will be discarded, which is not a problem at all if you keep that in mind when using our application.
Once you install it on your device, it will become dedicated to that device. However, this device can be plugged into any other compatible device. The second device will boot from it, and there you go. All you need to do is carry the carrier and take care.
We are treating our customers to additional features that emerge as we progress and as we, along with you, see the reason to include them.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.