ETOEE

END-TO-END ENCRYPTED

etoee_secure_terminal CONNECTING

etoee v0.1.0 [secure terminal]

══════════════════════════════════════════

> crypto: Signal Protocol (X3DH + Double Ratchet)   [OK]

> crypto: Sender Keys (group forward secrecy)      [OK]

> net: sealed-sender relay (zero metadata)         [OK]

> auth: WebAuthn/passkey (FIDO2)                   [OK]

> audit: PII on server ───────────── 0 bytes

> audit: server cleartext access ── none by design

> The line is secure._

>
[ JACK IN ]

> But first, let's talk about the wire.

01 // THE PROBLEM

> SYSTEM ALERT:

> Every message you have ever sent traveled through

> someone else's servers.

> Their infrastructure. Their rules. Their backdoors.


> Your phone number is your identity.

> Your contacts are their database.

> Your conversations are their product.


> You are being watched.

> You have always been watched.

> ETOEE is a different architecture.


> No phone number. No email. No identity on file.

> Your device generates the keys. You choose the handle.

> You decide who gets in.


> The server sees encrypted noise.

> This is not a feature. This is the architecture.

> It cannot comply with subpoenas for data it does not possess.

02 // HOW IT WORKS

step_01

> GENERATE KEYS

Your device creates a cryptographic identity. Private keys never leave the device. Your face or fingerprint is the key.

step_02

> CHOOSE HANDLE

Pick a username. No phone. No email. This is your only identifier on the network.

step_03

> CONNECT

Find contacts by handle. Both parties must consent before messages can be exchanged.

step_04

> SPEAK FREELY

Every message encrypted with the Signal Protocol. Every group secured with Sender Keys. Every call encrypted end-to-end. The server sees noise.

03 // WHAT THE SERVER KNOWS

server_audit.log
DATA POINT ETOEE KNOWS?
Your name> NO
Your phone number> NO (never collected)
Your email> NO (never collected)
Message content> NO (encrypted blob)
Your contact list> NO (client-side only)
Group membership> NO (client-side only)
Group names> NO (groups don't exist on server)
Who sent a message> NO (sealed sender)
Call audio/video> NO (Insertable Streams E2EE)
Your username> YES (public identifier)
Your public keys> YES (by design, they are public)