How It Works Features Security Compare Pricing About Sign In Start Free →
Zero-knowledge messaging. Encrypted vault. No tracking.

The digital sanctuary
your private life deserves.

Eclipse Veil gives you end-to-end encrypted messaging, a zero-knowledge encrypted vault, one-time view media, and panic mode — all in one platform built from the ground up with privacy as the architecture, not an afterthought.

No phone required Create your identity with a handle. No SIM card, no phone number, no carrier exposure.
Panic mode ready One tap wipes sessions, purges keys, and makes your account invisible in under 2 seconds.
Vault + messaging One ecosystem for private chat, encrypted files, secure backup, and AI-assisted privacy.
Eclipse Veil — private messaging interface
Private Session

Speak freely. Store securely. Vanish on command.

AES-256-GCM on your device. Keys generated locally. Server sees only ciphertext.

Encrypted message
"The file is in the vault. Access expires in 10 minutes."
Client-side encrypted · self-destruct enabled
Secure vault
Case brief / medical notes / personal archive / source documents
Zero-knowledge storage · recovery phrase protected
256-bit AES-GCM encryption
Every message encrypted on-device before it leaves.
0 Ads. Trackers. Selling.
We have no business model that conflicts with your privacy.
18+ Controlled access
Age-verified, invitation-gated onboarding.
Vault Nodes
Contracts · IDs · evidence · archives
Ephemeral Controls
5s to 30d timers · device revoke · wipe flow
Cross-Platform
Web · iOS · Android — one private experience

What makes Eclipse Veil different

Most apps treat privacy as a setting. We built the architecture so privacy is the only possible outcome — not a promise, not a policy, but a structural guarantee.

Zero knowledge Designed so we cannot access your data. Client-side keys, server-side ciphertext — architecture, not policy.
No phone needed Pseudonymous accounts. No SIM card, no carrier record, no exposure vector.
Panic mode One tap wipes sessions, purges keys, and makes your account invisible instantly.
One-time media Photos and videos that permanently vanish after a single view. No recovery possible.
Eclipse SI Privacy-first AI that learns from patterns — never from your plaintext content.

Private by design,
from your first step.

Registration takes under two minutes. No phone number. No real name. No verification email required. Here is exactly what to expect when you join.

1

Choose your handle

Pick a pseudonymous username — your entire identity on Eclipse Veil. No real name, no phone number, no email required. Just a handle and a passphrase.

Age verification is required (18+) to keep the platform safe. This is a one-time step and does not link your identity to your account.
2

Save your recovery phrase

You receive a BIP39 recovery phrase — 12 words that are your cryptographic identity. Write them down and store them safely. This phrase is the only way to recover your account. We never store it.

No recovery phrase = no recovery. This is intentional. Zero-knowledge means we cannot help you bypass it — and neither can a court order.
3

Start messaging privately

Send your first encrypted message, upload a vault file — all from a single inbox. The free Civilian tier includes unlimited end-to-end encrypted messaging, 100 MB vault storage, and full encryption protection. No time limit, no credit card.

No credit card required to start. Upgrade any time from inside the app.

Six pillars of a complete
private-life platform.

Each feature built encryption-first. Not bolted on — the foundation. Six capabilities no other messaging app offers together in one place.

Encrypted Conversations

AES-256-GCM end-to-end encryption. Messages encrypted before leaving your device. The server is a blind relay — it routes ciphertext, nothing more.

  • ECDH P-256 key exchange — keys generated on your device
  • Server stores only ciphertext, never plaintext
  • HMAC-authenticated messages prevent tampering
  • Multi-device support with per-device key isolation

Self-Destruct Controls

Disappearing messages from 5 seconds to 30 days. One-time view photos that vanish permanently after opening. No server-side traces. No recovery possible.

  • Timer set per-message, not per-conversation
  • View Once photos: open once, gone permanently
  • Server-enforced deletion — no client bypass possible
  • Scheduled deletion queue with cryptographic proof

Zero-Knowledge Vault

Encrypted file and note storage where your recovery phrase is the only key. We store ciphertext only. Not even a legal demand changes what we can provide.

  • Files encrypted client-side before upload
  • PBKDF2 key derivation from your recovery phrase
  • Supports documents, images, notes, archives
  • 100 MB free · up to unlimited on Shadow Director

Pseudonymous Identity

No phone number. No real name. Create a handle-based identity with a BIP39 recovery phrase. You own your identity entirely. No SIM exploitation possible.

  • Handle-only registration — no email or phone required
  • BIP39 12-word recovery phrase is your identity key
  • Referral-gated invitations for trust chains
  • Account fingerprint for cryptographic verification

Panic Mode

Emergency lockdown at one tap. Wipes sessions, purges cached decryption keys, and makes your account invisible. Built for journalists, lawyers, activists — real risk scenarios.

  • Accessible from profile in under 2 taps
  • Purges all in-memory decryption keys immediately
  • Account becomes invisible to all contacts
  • Recovery via your BIP39 phrase when safe

Unified Privacy Suite

Messaging, vault, backup, voice messages, group chats, multi-device sync, and AI-powered threat analysis — one seamless ecosystem for your entire private digital life.

  • Multi-language translation in encrypted chats
  • Voice messages with E2E audio encryption
  • Group chats with forward-secrecy key rotation
  • Eclipse SI — privacy-first AI assistant built in
Emergency Feature — Operative tier and above

Panic Mode — exactly what happens

Panic mode is built for real-risk situations. A journalist at a border crossing. A lawyer under pressure. An activist at risk. One tap triggers a complete, irreversible lockdown. Here is the sequence, step by step.

1

Trigger

Navigate to your profile and tap the Panic Mode button — or use the quick-access gesture. No confirmation dialog slows you down.

2

Keys purged

All decryption keys are wiped from device memory and session storage. Any cached plaintext is overwritten. This happens in under 500ms.

3

Account goes dark

Your account becomes invisible to all contacts. Incoming messages cannot reach you. Your profile does not appear in searches or contact lists.

4

Session terminated

All active sessions — on all devices — are destroyed server-side. You are logged out everywhere simultaneously, with no residual session tokens.

0ms — Trigger received
~200ms — Keys zeroed
~400ms — Account invisible
~600ms — All sessions revoked
Complete in under 2 seconds
Recovery after Panic Mode

When it is safe to return, use your 12-word BIP39 recovery phrase to restore access. Your messages remain encrypted on the server — only you, with your phrase, can decrypt them. Without the phrase, no one can recover your data, including us.

Eclipse Veil vs. Signal,
WhatsApp, and Telegram.

Signal is the gold standard for private messaging — and a platform we respect. Here is an honest comparison of what Eclipse Veil adds, and where the differences lie.

Capability Eclipse Veil Signal WhatsApp Telegram
Always-on end-to-end encryption Always Always Always Optional
Built-in encrypted vault Built in None None None
No phone number required Never Required Required Required
Panic mode / emergency wipe Yes No No No
No ads / no data selling Never Never Meta-owned Less clear
Zero-knowledge encrypted backup Yes No No No
One-time view media Yes Limited Limited No
Pseudonymous / no real identity Yes No No Partial

Why would someone use Eclipse Veil instead of Signal?

Signal is excellent for encrypted messaging and we recommend it to anyone who needs a proven, audited messenger. Eclipse Veil is a different product — it adds capabilities Signal was not designed to provide.

NO PHONE NUMBER

Signal requires a phone number to register — which ties your identity to a SIM card that can be subpoenaed, tracked, or ported. Eclipse Veil uses a pseudonymous handle. No phone, no carrier, no exposure vector.

BUILT-IN ENCRYPTED VAULT

Signal is a messenger. Eclipse Veil is also a zero-knowledge encrypted file and note vault. Store case briefs, identity documents, medical records, and source files — all encrypted before they reach the server.

PANIC MODE

One tap wipes your decryption keys, makes your account invisible, and destroys all sessions on all devices — in under two seconds. Signal has no equivalent emergency response. Eclipse Veil was designed for real-risk scenarios.

HONEST TRADEOFFS

Eclipse Veil has not completed an independent security audit (it is planned). Signal has. If a proven, audited messenger is your primary need, Signal is the right choice. Eclipse Veil offers additional capabilities for users who need the full privacy suite.

Security that feels credible
because it is credible.

Not claims — architecture. Every layer is designed so we hold only ciphertext: your keys never leave your device, which means we have nothing to hand over — even under legal pressure.

A

AES-256-GCM + ECDH P-256

Authenticated encryption for every message. Elliptic-curve Diffie-Hellman key exchange. Keys generated on your device and never transmitted in plaintext — mathematically sound, not policy-dependent.

EncryptionAES-256-GCM
Key ExchangeECDH P-256
MACHMAC-SHA256
KDFHKDF-SHA256
T

TLS 1.3 + strict security headers

All communication uses TLS 1.3. HSTS enforced with a 1-year max-age. Content Security Policy, X-Frame-Options, X-Content-Type-Options, and zero-trust session management protect every layer.

TransportTLS 1.3 only
HSTS max-age31 536 000s
CSPstrict-src enforced
Sessionzero-trust + MFA
Z

Zero-knowledge by architecture

The server stores only ciphertext. PBKDF2 key derivation means your passphrase stays local. We have nothing to hand over — not because of policy, but because we never held your keys in the first place. A legal demand can only produce what we store: encrypted data.

Key DerivationPBKDF2 · 600k rounds
Vault Keysclient-side only
Server storesciphertext only
RecoveryBIP39 12-word phrase
SOC 2 Principles Architected to meet SOC 2 security and availability criteria throughout
Compliance by Design
GDPR & CCPA Ready Full data export and deletion on request. Your data, your rights — everywhere.
Right to Erasure
Warrant Canary We publish active canary status and all government request counts quarterly.
Active — 0 Requests
Security Whitepaper Full technical documentation of our encryption design, key management, and threat model — published and open for review.
Read the Whitepaper
Warrant Canary Active — No secret government orders received
0 Government data requests fulfilled
0 Data breaches or leaks
Never User data sold to third parties
Full Transparency Report

Live Transparency Dashboard

Updated live
0
Government data requests received
Since launch · All time
0
Requests fulfilled or complied with
Cannot provide plaintext — by design
0
Data breaches or unauthorized disclosures
Ciphertext-only storage limits exposure
Warrant canary — active
No secret court orders received

Full report published quarterly at eclipse-veil.com/transparency

Common questions

No. Messages are encrypted on your device using keys we never possess. The server receives and stores ciphertext only. Even if our infrastructure were compromised, your messages remain unreadable without your private keys.
We publish all legal requests on our Transparency Report. Because we store only ciphertext and never hold your private keys, we are technically unable to provide readable communications — regardless of jurisdiction or legal pressure. A legal demand can only produce what we actually store: ciphertext that is meaningless without your keys.
No phone number is ever required. Email is optional and only used for account recovery if you choose to provide one. You can register with only a handle and passphrase, keeping your identity entirely pseudonymous. Age verification (18+) is required but performed anonymously — we never see your identity documents.
Your in-memory decryption keys are purged, your account becomes invisible to all contacts, and all sessions on all devices are terminated — in under 2 seconds. Your encrypted data remains on the server but is completely inaccessible without your recovery phrase. No one can read it — including us. Recovery requires your 12-word BIP39 phrase when you are safe to return.
Genuinely end-to-end. Encryption happens in your browser or app before the message is sent using AES-256-GCM. Decryption happens on the recipient's device. At no point does our server hold a plaintext version of any user-authored content. We are a blind relay — we route ciphertext, nothing more.
AES-256-GCM for message encryption (provides authenticated encryption natively via GHASH — no separate HMAC needed). ECDH P-256 for key exchange. HKDF-SHA256 for per-conversation key derivation. PBKDF2-SHA256 (100,000 iterations) to protect private keys with your password. scrypt for server-side account password hashing. All implemented via Web Crypto API and native platform libraries.
AES-256-GCM · ECDH P-256 · HKDF-SHA256 · PBKDF2-SHA256/100k · scrypt
Yes — Shadow Director tier includes a full self-hosting package with Dockerfile, docker-compose, and nginx configuration with TLS and WebSocket proxy. Deploy the entire platform on your own infrastructure, keeping all data under your direct control. No dependency on our servers.

Built for those who
can't afford to be wrong.

Eclipse Veil serves anyone who needs genuine privacy — not just the privacy-curious, but professionals and individuals operating in real-risk environments.

J

Investigative Journalists

Protect sources, communicate off-the-record, and store evidence securely. Panic Mode provides instant protection when crossing borders or under surveillance pressure.

Source protection Border crossings Panic Mode
A

Attorneys & Legal Professionals

Attorney-client privilege demands zero-knowledge storage. Vault your case briefs, store confidential documents, and communicate with clients knowing no third party can access the content.

Attorney-client privilege Zero-knowledge vault Document storage
R

Security Researchers

Coordinate vulnerability disclosures, share sensitive findings, and collaborate securely. The encrypted group chat and vault handle the most sensitive technical communications.

Vulnerability coordination Group chats Encrypted vault
E

Executives & C-Suite

Board communications, M&A discussions, and strategic planning require absolute confidentiality. Multi-seat organization features built for teams — Shadow Director tier.

Board comms Multi-seat org Compliance dashboard
H

Healthcare Professionals

HIPAA-sensitive communications, patient notes, and referral documents — stored encrypted and accessible only to you. No cloud sync that compromises patient data.

Patient privacy Encrypted notes Zero-knowledge vault
P

Privacy-Conscious Individuals

You don't need to be a high-risk professional to deserve privacy. Personal correspondence, private documents, and secure backups — everyone benefits from zero-knowledge architecture.

Personal privacy No tracking Free to start

Why Eclipse Veil exists.

Most privacy tools are built reactively — security bolted onto a product designed without it. Eclipse Veil started from a different question: what if the architecture made privacy inevitable?

01

The problem: privacy as policy

Every major platform says "we respect your privacy" — and means "we choose to, today, under current laws." That's a policy, not a guarantee. The only real privacy guarantee is one enforced by mathematics: if we never hold your keys, we can never reveal what we cannot access.

02

The design: encryption first, features second

Every feature in Eclipse Veil — messaging, vault, panic mode, backups — was designed around the encryption layer, not added on top of it. This means the user experience sometimes has real constraints: no phone recovery if you lose your phrase, no plaintext search, no metadata-free magic. Real privacy has real tradeoffs. We're honest about them.

03

The commitment: honest about what we are

Eclipse Veil is a new platform. We haven't been independently audited yet — our security whitepaper is published and open for expert review. We don't have famous backers. What we have is a clearly documented cryptographic architecture, a public transparency report, and a product you can start using today at no cost. Judge us by the architecture, not the marketing.

Choose your plan.

Start free. Upgrade when you're ready. No credit card required. Cancel any time.

// FREE

Civilian

Full encryption at no cost. No card needed.

$0 / forever
  • Unlimited messaging
  • Encrypted vault (100 MB)
  • Pseudonymous account
  • Core E2E protection
  • Disappearing messages
  • Panic mode
Get Started Free
// ADVANCED

Field Agent

Maximum control for serious needs.

$9.99 / mo
  • Everything in Operative
  • Vault 20 GB
  • Group chats
  • Zero-knowledge backup
  • Multi-language translation
  • Eclipse SI priority access
Go Field Agent
// ENTERPRISE

Shadow Director

Maximum capabilities for organizations.

$19.99 / mo
  • Everything in Field Agent
  • Unlimited vault storage
  • Multi-seat organization
  • Admin control panel
  • Priority support
  • SOC 2 compliance dashboard
Claim Directorship

Access Eclipse Veil
on any device

Eclipse Veil runs in your browser right now — no installation required. Native iOS and Android apps are in development and launching soon. Join the waitlist to be notified the moment they are live.

iOS App

Native iPhone and iPad app with full biometric lock, background protection, and Secure Enclave integration.

Coming Soon — App Store
Join Waitlist

Android App

Native Android app with full Play Store distribution, widget support, and system-level notification privacy.

Coming Soon — Play Store
Join Waitlist

Already testing? Open Eclipse Veil in your phone's browser for the full mobile experience today. All features — including encrypted messaging, vault, and panic mode — work on mobile browsers.

Who We Are

Built by people who believe
privacy is a right, not a feature.

Eclipse Veil is developed with a single focus — give people genuine control over their data and communications through architecture that enforces privacy, not just policy.

Founder
Alvin Dorsey Jr.

Founder and architect of Eclipse Veil, leading the vision for a privacy-first communication platform with no compromises.

Operating Company
Any Day Anime LLC

A U.S.-registered company operating Eclipse Veil as part of the Eclipse AI Ecosystem — a suite of intelligent, privacy-first digital platforms.

Development Team
Eclipse SI Studios

The engineering team behind Eclipse Veil's encryption architecture, AI systems, and platform infrastructure.

Make your private life
as secure as it deserves.

End-to-end encrypted messaging, zero-knowledge vault storage, pseudonymous accounts, panic mode, and an AI that keeps your data private — all in one platform. Start free, no credit card required.