Join us



To get in touch with us, give priority to end-to-end encryption and pick the most suitable communication channel from the options below. 

Here's the process: 

Following our initial contact, we typically arrange a secure video meeting, utilizing a trusted application like Jitsi During this initial video meeting, we will address your inquiries using solely the information that is already publicly accessible on our website.

Should the project proceed, we will provide you with a Non-Disclosure Agreement (NDA) to ensure that all involved parties on your end comprehend that any shared information will be treated as highly confidential.

To get in touch with us, give priority to end-to-end encryption and pick the most suitable communication channel from the options below.

Available channels

1. Session


Session is a blockchain based secure and anonymous communication application. You can download it here.

Your messages will be accessible to all our Nodes as this is a shared account. Kindly communicate in English.

Here are the pros of using Session as a communication's app: 

Here are the cons of Session:

Due to its decentralized nature, it currently operates at a slower pace and does not yet support an integrated video feature.

Here's our contact ID: 058ac7093d8a0c2a80960c03866565dc1b2e1fef9b8c24e5c04f1828240cb6dc53

Here is the QR Code for contacting us using a mobile device:

session QR code

Please scan this code with your mobile device to initiate contact

2. Wickr


Wickr is a military grade secured communication application that offers forensic resistant deletion of messages. You can download AWS Wickr (not WickrGov) here.

Here are the pros of using Wickr: 

  • Always-on end-to-end encryption even on video and audio.
  • 1:1 encrypted video feature

  • Expiration time
  • Forensic resistant deletion of messages with overwriting.

Here are the cons of using Wickr: 

  • The company based in the United States with servers also located in the US. This makes it subject to regulations like the Cloud Act, Prism, and Echelon, as well as potential undisclosed subpoenas.
  • While the central server records your IP address and metadata, your messages remain encrypted on their servers.
  • The code used is not open source.
  • During the registration process, they do ask for your phone number. While you have the option to skip this step, it does suggest an intent to gather personal information.
  • During the registration process, they do ask for an email.We strongly suggest you create a secure email with Protonmail or Tutanota for this purpose.

3. Email.


Email is widely considered one of the least secure communication channels in use today. It was developed in the 1970s without a primary focus on security. If you're unable to provide us with your PGP key, we kindly request that you discontinue the use of email and opt for encrypted messaging applications for more secure communication.

3.1 Encryption

The sole method to safeguard an email is through PGP encryption, which encrypts the email's content but not its header information (recipient, sender, subject).

Preferably, you can use email in this order: 

Use Tutanota for communication, as we also use this platform. This ensures that your emails will be automatically encrypted during transit. You can download Tutonata here.

You can send us an email:

3.3- Public PGP Key

You can download our Public PGP key as a text file here.

4. Jitsi


If you are leading a meeting, here is the recommended procedure:

1. Consider using a VPN to mask your IP address when connecting to Jitsi's servers. Go for a fast VPN service to ensure good video quality. ExpressVPN, for example, is a suitable option (we have no affiliation to them).

2. A few minutes before the scheduled time, visit Jitsi's website and initiate a new session by clicking here

3. Within this session, use the "invite" feature to generate a link.

4. Share this link with other participants via a secure communication channel such as Wickr, Wire, or Threema.

4.1. Alternatively, if necessary, share the link via email, ensuring to encrypt the email content using PGP.

4.2. If the above isn't feasible, ensure that all participants are using either Tutanota or ProtonMail, enabling each email to be end-to-end encrypted with PGP prior to transmission.

Note that Tutanota and ProtonMail are not interoperable; all participants must use the same email provider.

4.3. If none of the above options are viable, use an unsecured email, deleting it once it's no longer needed.

Minimize the information provided in the email subject and body.