PARANOID? GOOD. You should be.
Let's face it: Most "secure" messengers are lying to you. They store your metadata. They back up your chats to their clouds. They comply with "legal requests". They know who you talk to, when, and for how long.
P2Ply is different. It is built for the paranoid.
- NO Database: We don't have a database. We couldn't store your data if we wanted to.
- RAM Only: Everything lives in your device's memory. Close the tab, and it's gone forever.
- Visual Identity Check: Don't trust the code? Trust your eyes. Verify your peer's unique fingerprint visually to ensure no Man-In-The-Middle attack.
- Persistenceless: The server tunneling and keys are destroyed the moment you stop the script. No logs. No traces.
We have created universal installers that automatically handle everything for you. They will:
- Check for Git, Python, and Node.js.
- Automatically install missing tools (using Winget on Windows or guiding you on Mac).
- Clone or update the repository.
- Launch the application and open your browser securely.
- Download the
install_win.batfile. - Double-click to run.
- Note: Please turn on your VPN before running if you are in a restricted region.
- Download the
install_mac.commandfile. - Double-click to run.
- Note: You may need to grant execution permissions or trust the script.
git clone https://github.com/DeepPythonist/p2ply.git
cd p2ply
python3 launcher.pyFollow these steps for a zero-trace communication session:
Once the installer finishes, it will automatically open your secure link in the browser. It looks like:
https://3fd41d4ffe2ae4.lhr.life
- Click "Create Secure Room".
- Copy the generated Invite Link (e.g.,
https://3fd41d4ffe2ae4.lhr.life?code=482910).
Send the link to your peer. When they open it and click "Join Room", you will both see the Security Check.
You will see two "Fingerprints" on your screen. Alice's screen MUST show the same Peer Fingerprint that Bob sees as his own Identity.
- Ask your peer: "Does your identity end in A4B2?"
- If they match, both click "YES, CONNECT".
You are now in a True P2P E2EE tunnel.
- No data touches a hard drive.
- The signaling server only sees encrypted noise.
- Once you click "END SESSION", the keys are purged from RAM.
graph TD
subgraph Client_A ["Peer A (Alice)"]
A_RAM["RAM Only Storage"]
A_Keys["Ephemeral Keys"]
end
subgraph Client_B ["Peer B (Bob)"]
B_RAM["RAM Only Storage"]
B_Keys["Ephemeral Keys"]
end
Server(("Signaling Server"))
Tunnel["Secure Tunnel"]
%% Signaling
A_RAM -.->|"Signaling / Handshake"| Tunnel
Tunnel -.->|"Relay Fallback"| Server
Server -.->|"Relay Fallback"| Tunnel
Tunnel -.->|"Signaling / Handshake"| B_RAM
%% Direct P2P
A_RAM <==>|"WebRTC DataChannel <br/> AES-256-GCM E2EE"| B_RAM
%% Identity
A_Keys -- "Visual Fingerprint Check" --> B_Keys
%% Styling
style Client_A fill:#1e293b,stroke:#3b82f6,color:#fff
style Client_B fill:#1e293b,stroke:#10b981,color:#fff
style Server fill:#f43f5e,stroke:#fff,color:#fff
- 🔒 True End-to-End Encryption: powered by Web Crypto API (ECDH + AES-256-GCM).
- 👻 Ghost Mode: Minimal footprint. No installation required for clients.
- 🌍 Instant Global Access: Generates a secure tunnel (
localhost.run) automatically. - 🎨 Cyberpunk Glassmorphism UI: Because security should look good.
While P2Ply uses military-grade encryption, remember:
- Trust No One: Always verify fingerprints.
- Browser Isolation: Use a clean, private browser window.
- Endpoint Security: If your device has malware, no software can save you.
Made with 🖤 (and a healthy dose of paranoia)
If you value your privacy, give us a ⭐ on GitHub.
P2Ply: Because they ARE watching.
