Threema provides maximum security and comprehensive privacy protection

No other chat service offers a similar level of security, metadata restraint, and confidentiality.

Security and Privacy by Design

Threema was designed from the ground up with security and privacy in mind. Since day one, the restraint on metadata has been our guiding principle. For where there is no data, no data can be misused. Threema’s servers only assume the role of a switch: After a message has been delivered to its recipient, it will be permanently deleted at once.

The focus on security and privacy protection is also reflected in the implementation of numerous particular features, such as profile pictures, Threema calls, and the web client.

Consistent end-to-end encryption

In Threema, all communication is end-to-end encrypted. This is to say that any type of message is protected against eavesdropping, including group messages, photos/videos, files, voice calls, and even status messages. In contrast to conventional messenger apps, a fallback to unencrypted connections is ruled out by design. Nobody else except the intended recipient can read a Threema message.

Threema employs the tried and tested open-source cryptography library NaCl. The correctness of the encryption can be independently verified.

The algorithms and design decisions behind the cryptography in Threema are explained in detail in the Cryptography Whitepaper.

I have news about the YLO project… Could you send me the current report, please? Thank you!
Sure, I’ll send it right away… I'm curious about your YLO news! :-)
My Threema ID
G2WHL1A8
Profile QR Code

Anonymous use, no account required

It is not necessary to provide a phone number or email address in order to use Threema. When setting up the app, each user generates a Threema ID, which serves as unique identifier. Since this ID is a random sequence of characters, Threema can be used anonymously. No central user account is created.

Optional Contact Synchronization

Threema can be used without access to your address book. If you do grant access to the address book in order to retrieve your contacts’ Threema IDs, the contact data is transferred in one-way encrypted form and will not be stored on the server.