Loading…
Loading…
Security
Signal ProtocolWe designed Skycord so that even we can't read your messages. This page explains exactly how.
How it works
Every message, file, and voice call is encrypted using the Signal Protocol before it leaves your device. Not even Skycord can read your messages — ever.
Your encryption keys never leave your device in plaintext. We store only public keys on our servers — the private key stays with you.
We architect Skycord so that even a full breach of our servers reveals nothing. Metadata is minimised. Message content is inaccessible without your keys.
Host your own Skycord instance on your own infrastructure. Full control over data residency, access, and backup. One Docker command to get started.
Infrastructure
We run on redundant, geo-distributed infrastructure with automatic failover and continuous security monitoring.
Global CDN
Edge nodes in 30+ regions
Data residency
EU and US regions available
Uptime SLA
99.9% guaranteed for Business
SOC 2 Type II
Audit in progress (2026)
GDPR compliant
DPA available for Business plans
TLS 1.3
All transit encrypted
Found a vulnerability? We pay for it. Reach out to security@skycord.space with a full report and we'll respond within 24 hours.
Common questions
Can Skycord employees read my messages?
No. All messages are encrypted before they leave your device using the Signal Protocol. Our servers only ever see ciphertext. We have no technical ability to decrypt your messages.
What happens if Skycord gets hacked?
An attacker who breaches our servers would only find encrypted ciphertext, public keys, and minimal metadata. They would not be able to read any message content without access to users' private keys, which are never stored on our servers.
Is the server software open source?
Yes. The Skycord server is open source on GitHub. You can audit, fork, and self-host it. We believe transparency is a prerequisite for trust.
Do you comply with government data requests?
We comply with valid legal process. However, because of our zero-knowledge architecture, we can only provide public keys and connection metadata — never message content. We publish a transparency report each quarter.
What encryption does Skycord use for voice and video?
Voice and video calls use SRTP (Secure Real-time Transport Protocol) with keys negotiated via DTLS-SRTP. The media stream is end-to-end encrypted for 1:1 calls, and we're building E2E encryption for group calls in Q3 2026.
Built on the same protocol that protects journalists and activists. Available to every Skycord community, for free.