VELA is built on the principle that privacy and compliance are not opposites. You can have both โ and you deserve both.
Every message is encrypted on your device before it leaves. Only you and the recipient hold the keys. Not VELA, not any government, not any hacker.
Signal ProtocolMessages travel directly between devices. Our server only facilitates the initial handshake โ it never sees, stores, or processes your message content.
WebRTCYou sign up with a username and password only. We don't know your real name, phone number, or location unless you voluntarily share it on your profile.
No Phone RequiredWe store only what's necessary: your username, encrypted profile data, and connection graph. Message content is never stored on our servers.
GDPR by ArchitectureEncryption keys rotate automatically. Even if a key were ever compromised, past messages remain secure. Forward secrecy built in at the protocol level.
Double RatchetAdvanced users can route traffic through Tor for additional anonymity. IP addresses are never logged by default. Privacy is the default, not the exception.
Phase 2Different countries have different rules. VELA doesn't apply one-size-fits-all KYC. Instead, verification requirements are triggered only when local law requires it โ and only for the specific actions that require it.
The message exists only in your device's memory. Nothing has been transmitted yet. Your keystrokes are never sent anywhere.
On-Device OnlyUsing the Signal Protocol's Double Ratchet algorithm, the message is encrypted with a session key known only to you and the recipient. This happens before any network call.
Signal ProtocolOur server receives only the encrypted blob and the recipient's ID. It cannot read the content. It matches the recipient and routes the blob โ like a sealed envelope.
Zero-Knowledge RoutingIf both users are online, a WebRTC peer-to-peer channel opens. The encrypted message travels directly device-to-device. Our server is no longer involved.
WebRTC P2POnly the recipient's device holds the private key needed to decrypt the message. Even if someone intercepted the encrypted blob mid-transmission, they could not read it.
E2EEAfter decryption, if auto-translation is on, the plaintext is translated locally on the recipient's device using an on-device model. The translation never leaves the device.
On-Device ยท ML Kit