Invite-Only Early Access
Talk Freely.
No One Is Listening.
X1Knows is a secure messaging platform for journalists, activists, and anyone who needs private communication. Messages are encrypted on your device — our servers can never read them. Rooms self-destruct. No trace left behind.
People Like You Use X1
“I needed to talk to my source without putting them at risk. Regular messaging apps store metadata that can identify who talked to whom.”
Protecting whistleblowers and sources in investigative journalism.
“We organize protests and community action. In our country, the wrong message in the wrong hands means prison.”
Organizing safely in restrictive environments.
“My family is split across a conflict zone. We just need to know everyone is safe without anyone tracking our location.”
Families communicating safely during crisis.
“We share trade secrets and deal terms. A leaked message could cost millions. We needed something our own IT team can’t read.”
Protecting sensitive business communications.
Built For People Who Need Real Privacy
Journalists protecting sources. Activists organizing safely. Families in conflict zones. Anyone who needs to communicate without being watched.
Only You Can Read It
Your messages are encrypted on your device before sending. Not even our servers can see what you write.
Smart Without Seeing
Our platform routes and organizes your conversations — all while your data stays encrypted. We help without looking.
No Trace Left
No logs of who you talked to. No record of when. No way to connect you to your conversations.
Rooms That Vanish
Set a timer. When it's up, the entire room — messages, files, everything — disappears permanently.
Ask For Help Safely
In danger? Send an encrypted help request to verified NGOs and responders — without revealing who or where you are.
Don't Trust Us — Verify
Our code is open source. Security researchers can audit every line. Trust is earned, not claimed.
Built on Math, Not Promises
Three layers. One truth: your data never exists in plaintext outside your device.
Device Crypto Layer
Runs in your browser. Key generation, local encryption/decryption, session identity, temporary tokens, secure deletion.
FHE Compute Engine
Encrypted processing, matching, filtering, routing logic. Computations happen on ciphertext. Servers are mathematically blind.
Delivery Layer
Network transport, room access, message relay, notification triggers. This layer knows as little as possible.
What Our Servers See
The backend coordinates. Your device protects.
How X1 Works
No download. No signup. Instant protection.
Open X1Knows
Open the web app. No download needed. No phone number. No email. Start instantly.
Open X1Knows
Open the web app. No download needed. No phone number. No email. Start instantly.
Device Generates Keys
Your browser generates temporary encryption keys. Session identity created locally. Nothing leaves your device unencrypted.
Device Generates Keys
Your browser generates temporary encryption keys. Session identity created locally. Nothing leaves your device unencrypted.
Communicate Securely
Send encrypted messages. Create secure rooms. Share encrypted locations. Request help. All content encrypted before transmission.
Communicate Securely
Send encrypted messages. Create secure rooms. Share encrypted locations. Request help. All content encrypted before transmission.
Self-Destruct & Vanish
Set timers. Messages vanish. Sessions expire. Keys are destroyed. No trace remains — anywhere.
Self-Destruct & Vanish
Set timers. Messages vanish. Sessions expire. Keys are destroyed. No trace remains — anywhere.
Help Without Exposure
Your emergency request is protected before it leaves your device. We route it to verified responders — without exposing you.
One tap. Encrypted on-device. Anonymous by default.
How it works
One Tap
User taps the emergency button.
Encrypted on Device
Request encrypted locally with FHE before it leaves your device.
Anonymous Routing
Classified and forwarded to verified responders without revealing your identity.
Permissioned Escalation
You choose what to reveal. Responder gets scoped access only.
Your encrypted request reaches
We don't promise to save you. We help connect you to those who can — without exposing you.
Content encrypted on-device. Only authorized parties can decrypt.