▶ Breaking
Meta is ending end-to-end encryption on Instagram DMs — May 8 2026. Here's what to use instead → // Discord leaked 70,000 government IDs. Why we built this → // OpenDescent v0.5.4 released — hubs, live streaming, signed file sharing. Download → // Normal life deserves privacy. // Meta is ending end-to-end encryption on Instagram DMs — May 8 2026. Here's what to use instead → // Discord leaked 70,000 government IDs. Why we built this → // OpenDescent v0.5.4 released — hubs, live streaming, signed file sharing. Download → // Normal life deserves privacy. //
FAQ  /  Everything people ask Updated 2026-04-24

Straight answers to the things people actually ask.

Fifty questions across eight categories — getting started, privacy, features, comparisons, recovery, technical details, pricing, and troubleshooting. No marketing fluff, no hand-waving. If your question isn't here, the links at the bottom will get you to an actual human on GitHub.

50+
Questions answered
8
Categories
0
Marketing fluff
No matches. Try a different term, or ask on GitHub Discussions ↗
Categories 01Getting started 02Privacy & security 03Features 04Comparisons 05Account & recovery 06Technical 07Pricing & Pro 08Troubleshooting
01
Getting started — the basics.
8 questions
What is OpenDescent?
01.01
OpenDescent is a free, open-source, decentralized peer-to-peer messaging and community app. It offers end-to-end encrypted text messages, voice and video calls, file sharing, community hubs with channels and roles, anonymous onion-routed posts (Dead Drops), and a Dead Man's Switch — all without central servers, phone numbers, emails, or accounts.
Overview
Is OpenDescent free?
01.02
Yes. OpenDescent is free and open source under the MIT license. Every core feature — messaging, calls, hubs, encryption, file sharing — is free forever. An optional Pro subscription (£5/month) unlocks larger file transfers and more hubs and helps fund the project, but is not required for core functionality.
Pricing
Do I need to give you my phone number or email?
01.03
No. OpenDescent requires no phone number, no email, and no account. Your identity is an Ed25519 cryptographic keypair generated on your device the first time you open the app. You back it up with a 12-word BIP39 mnemonic phrase — that's it.
IdentityPrivacy
How do I install OpenDescent?
01.04
Download the Windows installer from the download page or directly from GitHub Releases. Run the .exe, pick an install location, and you're done. No sign-up, no email confirmation — the app generates your identity on first launch.
Install
What platforms does OpenDescent work on?
01.05
  • Windows 10+ — fully supported today (v0.5.4)
  • macOS — build in progress, coming soon
  • Linux — build in progress, coming soon
  • iOS / Android — a Progressive Web App (PWA) is on the roadmap; native apps are longer-term
If mobile-first is a hard requirement for you today, Signal is probably a better fit while we work on it.
Platforms
Is there an iPhone or Android app?
01.06
Not yet. A Progressive Web App is on the roadmap, which will work on both iOS and Android via the browser. Native apps are further out. For now, OpenDescent is a desktop-first experience.
MobileRoadmap
How many people use OpenDescent?
01.07
Honestly: not many. We launched publicly in 2026 and are still in the early-adopter phase. Because OpenDescent has no analytics and no central server, we don't actually know how many people run the app — which is by design. If you care about reaching a big existing user base today, Signal or WhatsApp are better. If you care about being early on something that is a different architecture, welcome.
Scale
Why is the app called OpenDescent and not DecentraNet?
01.08
OpenDescent is the rebrand. The project was originally called DecentraNet internally; some protocol strings still use the old name for backward compatibility with early peers. User-facing, it's OpenDescent everywhere.
Brand
02
Privacy & security — what actually happens to your data.
9 questions
How is OpenDescent encrypted?
02.01
Every message uses an ephemeral X25519 key agreement with the recipient's long-term key, derives a symmetric key via HKDF-SHA256, encrypts with AES-256-GCM (authenticated encryption), and signs a hash of the ciphertext with Ed25519. Messages travel through libp2p Noise-encrypted transport channels. See the security page for the full walkthrough.
Encryption
Can OpenDescent read my messages?
02.02
No — and technically, there is no 'OpenDescent' in a position to. Messages are encrypted on your device before they leave, and OpenDescent has no central servers. There is no company-operated infrastructure between your device and your recipient's. Messages are readable only on the two endpoints, after decryption with the recipient's key.
Privacy
Is OpenDescent safe?
02.03
OpenDescent uses standard, peer-reviewed cryptographic primitives (Ed25519, X25519, AES-256-GCM, HKDF, libp2p Noise) and the codebase is open source and auditable. No formal third-party audit has been performed yet — that's on the roadmap. For the full honest threat model including what we don't protect against, see the security page's threat model section.
Security
Is OpenDescent safe from government surveillance?
02.04
For message content: yes, the cryptography is modern and strong enough to resist mass interception of content. For traffic analysis (who you're talking to, when): OpenDescent doesn't hide this by default — a sufficiently-resourced observer of internet traffic can see that you're connected to specific peers. Route OpenDescent over Tor or a trusted VPN if that matters for you. For targeted attacks on your device: no messenger in existence protects a compromised endpoint from a determined state-level adversary.
Surveillance
Has OpenDescent been audited?
02.05
Not by a professional third-party firm (like Trail of Bits, NCC Group, or Cure53) — not yet. The code is open source and uses standard primitives that are themselves extensively audited. A formal audit is on the roadmap and is partially what the Founder's Edition helps fund. We will not claim 'audited' until we are.
AuditTransparency
What data does OpenDescent collect?
02.06
The app: nothing. No analytics, no telemetry, no tracking — because there's no central server to send it to. The marketing website at open-descent.com uses Plausible, a privacy-friendly analytics service that does not use cookies and does not collect personal information. No third-party tracking pixels. No advertising SDKs.
DataPrivacy
Can I be tracked while using OpenDescent?
02.07
A direct peer you connect to can see your IP at connection time. This is a peer-level observation, not a global one — no single entity has the whole network graph. Your messages cannot be read by any peer (only the final recipient can decrypt them). If IP-level privacy matters, route OpenDescent over Tor or a VPN. Also consider Dead Drops, which are specifically designed for identity-free posts via onion routing.
Metadata
Is OpenDescent open source?
02.08
Yes. The full codebase is open source under the MIT license at github.com/Jaguwa/OpenDescent. You can read it, build it, fork it, modify it, and contribute to it. Everything claimed on this site is verifiable against the source code.
Open source
What happens if my device is stolen?
02.09
Your local messages are encrypted at rest — if the device uses disk encryption (Windows BitLocker, macOS FileVault) and a strong password, an attacker with physical access faces substantial effort before they can read anything. If they bypass that, they can read messages on that device and send as you going forward. You should: (1) recover your identity on a new device using your 12-word mnemonic, (2) tell your close contacts your key was potentially compromised and to re-verify via TOFU if possible, and (3) consider generating a new identity and rebuilding from trusted contacts.
LossRecovery
03
Features — what the app actually does.
9 questions
Can I make voice and video calls?
03.01
Yes. Voice and video calls use WebRTC with DTLS-SRTP encryption end-to-end. Connections are direct peer-to-peer when possible and fall back to TURN relays when NAT prevents direct connections. Relays see encrypted packets only — they never have decryption keys.
Calls
Can I send files?
03.02
Yes. File transfers use signed manifests (canonical JSON signed with your Ed25519 key) plus XOR-parity sharding for resilience and SHA-256 integrity hashes for each chunk. Recipients verify the signature before assembling the file. Free tier has a file size limit; Pro unlocks larger transfers.
Files
Can I create a community or server like Discord?
03.03
Yes — we call them hubs. A hub has text channels, voice channels, categories, roles and permissions, and invite links — the same shape as a Discord server. The difference is that hubs are peer-replicated across members' devices rather than hosted on a central server. See OpenDescent vs Discord for the full comparison.
HubsCommunity
What are Dead Drops?
03.04
Dead Drops are anonymous onion-routed posts. A post travels through several layered-encrypted hops before landing in a public space — each hop only sees the next hop, so no single node knows both sender and destination. Proof-of-work prevents spam, and a daily rotating network key means past drops can't be correlated with current ones. Designed for sources, whistleblowers, or any conversation that shouldn't have an attributable author.
Anonymous
What's a Dead Man's Switch?
03.05
A feature that automatically sends pre-arranged messages to specific people if you don't check in before a timer expires. Set the timer from 1 hour to 30 days, pick recipients, write the messages. Check in and the clock resets; miss a check-in and the messages are sent. Useful for travel, journalists protecting sources, or any "if I don't respond by X, tell these people Y" scenario. The switch runs on peer-to-peer infrastructure — no central authority to compel or disable.
Dead Man's Switch
Can I stream live video?
03.06
Yes. Live streams distribute mesh-pull style — each viewer pulls chunks from a few peers and redistributes to others, BitTorrent-style but for live video. The more people watching, the stronger the distribution. No central streaming server, no middleman who could cut the stream.
Streaming
Does OpenDescent have disappearing messages?
03.07
Not yet. Disappearing messages are on the roadmap for an upcoming release. For now, messages you delete on your device are removed locally, but anyone you sent them to still has a copy on their device.
Roadmap
Does it have stickers or reactions?
03.08
Emoji reactions: yes. Custom stickers: on the roadmap. Standard emoji and markdown formatting work today.
Roadmap
Can I have group chats?
03.09
Yes. Group chats use a shared AES-256 key distributed to members via individual E2E encrypted channels. When a member leaves, a new shared key is automatically rotated so the ex-member cannot decrypt future messages. Forward secrecy keeps past ones safe.
Groups
04
Comparisons — how we stack up.
6 questions
How is OpenDescent different from Signal?
04.01
Signal is end-to-end encrypted but runs on central servers and requires a phone number. OpenDescent is peer-to-peer (no central servers) and requires no phone number, no email, no account. OpenDescent also includes Discord-style community hubs which Signal does not. Signal has a longer independent audit track record, a larger user base, and native mobile apps — OpenDescent is currently Windows-only. See the full comparison.
vs Signal
How is OpenDescent different from Discord?
04.02
Discord text messages are not end-to-end encrypted; Discord servers can read them. OpenDescent's hubs offer the same shape (channels, voice, roles, invites) but everything is end-to-end encrypted and peer-replicated. Discord also leaked 70,000 government-ID photos in October 2025 and is pushing mandatory age verification; OpenDescent never asks for your ID. See the full comparison.
vs Discord
How is OpenDescent different from WhatsApp?
04.03
WhatsApp is end-to-end encrypted via the Signal Protocol — the cryptography itself is good. The difference is ownership: WhatsApp is owned by Meta (the same company ending Instagram encryption on May 8, 2026) and requires your phone number. OpenDescent has no owning company in a position to change the rules, and requires no phone number. See the full comparison.
vs WhatsApp
Is OpenDescent better than Telegram?
04.04
Telegram's default chats are not end-to-end encrypted — only "Secret Chats," which you must create manually, are E2E (and Secret Chats don't work in groups). Telegram's servers can read your default chats. OpenDescent is E2E by default with no toggle. So yes, on the E2E-by-default axis, OpenDescent is stronger. Telegram has larger networks and more channels/bots today.
vs Telegram
What about Matrix / Element?
04.05
Matrix (via Element) is federated — many servers interoperate, and you can run your own. That's a meaningful privacy improvement over a single-company service like Discord. OpenDescent goes one step further: there's no server at all. Each approach has trade-offs: federation has better moderation tooling and maturity; true P2P removes the server entirely and removes the setup friction of picking or running a homeserver.
vs Matrix
Is OpenDescent a good Instagram DM replacement?
04.06
For 1-on-1 and small-group private conversations, yes. Instagram DMs lose E2E encryption on May 8, 2026. If you move conversations where privacy actually matters — family, close friends, relationships — to OpenDescent, those conversations stay private. Instagram's broader public/social features (posts, reels, discovery) aren't in OpenDescent's scope. See Leaving Instagram DMs for the full guide.
Instagram
05
Account & recovery — your identity, your keys.
6 questions
How do I back up my account?
05.01
The first time you create your identity, the app shows you a 12-word BIP39 mnemonic phrase. Write it down on paper in a safe place, or save it in a trusted password manager (Bitwarden, 1Password, KeePass). That phrase is the only way to recover your account on a new device. Never send it to anyone, and never paste it into any other app.
Backup
What is the 12-word recovery phrase?
05.02
A 12-word sequence drawn from the BIP39 standard wordlist (the same system used for crypto wallets). It encodes 128 bits of entropy plus a checksum, and it deterministically derives your Ed25519 identity key. Typing the same 12 words on any OpenDescent device reconstructs the same account.
Mnemonic
What if I lose my mnemonic phrase?
05.03
Your account cannot be recovered without it. Because there is no central server storing your identity, there is no "forgot password" option — the mnemonic is the only way to reconstruct your cryptographic identity. This is the fundamental trade-off of true E2E encryption: security properties require that nobody, including us, can recover your account without your key.
Recovery
Can I use the same account on multiple devices?
05.04
Yes, by entering your 12-word mnemonic on each device — each one reconstructs the same identity. There is currently no cross-device message sync, though: each device sees only the messages received while it was online. Cross-device sync is on the roadmap but is architecturally tricky to do right without a central coordinating server.
Multi-device
Can I change my username?
05.05
Yes. Usernames are not globally registered — they exist within the trust graph of your contacts. You can change your display name at any time from Settings. Your cryptographic identity (the underlying Ed25519 key) is permanent; the human-readable name on top of it is not.
Username
Can I delete my account?
05.06
You can delete your local data from within the app, which removes your identity and messages from that device. There is no central record to delete, because there is no central database — so "deleting your account" just means removing your keys from your own devices. Messages you sent to others remain on their devices; they always did.
Deletion
06
Technical — how it works under the hood.
6 questions
How does OpenDescent work without servers?
06.01
Every device that runs OpenDescent is a peer in a libp2p mesh network. Messages travel directly from peer to peer, encrypted in transit (libp2p Noise) and encrypted end-to-end (AES-256-GCM). Peer discovery uses mDNS on local networks and KadDHT across the internet. No OpenDescent-operated machine sits between sender and recipient.
P2Plibp2p
What happens if the recipient is offline?
06.02
Store-and-forward: the encrypted message is held at another peer in the recipient's trust graph until they come back online. The holding peer sees ciphertext only — it can't read what it's holding, only that there's a message waiting for a specific recipient key.
Offline
Does it work behind a firewall or NAT?
06.03
Yes. OpenDescent uses DCUtR (Direct Connection Upgrade through Relay) for NAT hole-punching, attempting a direct peer connection via a temporary relay-assisted handshake. When hole-punching isn't possible, traffic falls back to Circuit Relay v2 — a relay node forwards encrypted packets without having the decryption keys.
NAT
What is libp2p?
06.04
libp2p is an open-source peer-to-peer networking stack originally built for IPFS and now used by Filecoin, Ethereum, Polkadot, and many other decentralized systems. OpenDescent uses libp2p for transport (with Noise encryption and Yamux multiplexing), peer discovery (KadDHT, mDNS), and NAT traversal (DCUtR, Circuit Relay v2). It's the reason the network architecture works without servers.
libp2p
Does OpenDescent work without internet?
06.05
Partially. On the same local network (same Wi-Fi, same LAN), two OpenDescent devices can communicate over mDNS with no internet access needed. Across the wider internet, you need connectivity to reach peers. There's no "fully offline mesh mode" today — it's an interesting future direction but not currently shipping.
OfflineLAN
Does OpenDescent use the Signal Protocol?
06.06
No. We use standard primitives (X25519, HKDF-SHA256, AES-256-GCM, Ed25519) assembled directly rather than adopting the Signal Protocol's Double Ratchet. Per-message ephemeral X25519 key agreement gives us forward secrecy without the Double Ratchet's stateful design — which fits peer-to-peer delivery more cleanly than a strictly server-mediated chain. See the security page for details.
Crypto
07
Pricing & Pro — how we fund a free app.
6 questions
Is there a paid version?
07.01
Yes — OpenDescent Pro, £5/month. It's optional. Every core feature (messaging, calls, hubs, encryption) is free forever. Pro unlocks larger file transfers, more hubs, and helps fund the project.
Pro
What does Pro include?
07.02
Pro unlocks:
  • Larger file transfers (higher per-file and monthly caps)
  • Unlimited hubs (free tier caps the number of hubs you can create)
  • Priority support on GitHub Discussions
  • A Pro badge on your profile, if you want one
None of these affect encryption, privacy, or the core messaging experience.
Pro
What is the Founder's Edition?
07.03
A one-time £1 purchase for lifetime Pro, limited to the first few users. It includes everything Pro includes, forever, plus a Founder badge on your profile. We launched it to reward people who supported the project early. See the homepage for current availability.
Founder
How much is Pro?
07.04
£5 per month. No annual or longer-term discounts yet (we'll add them once we know what sensible ones look like). Founder's Edition is a one-time £1 purchase for lifetime Pro, while spots remain.
Pricing
How do you make money if the app is free?
07.05
Entirely through Pro subscriptions and Founder's Edition purchases. No ads. No data sales. No "enterprise tier" that compromises on privacy for business customers. We can't run an advertising business because there is no central server to aggregate data from — and that's a feature, not a bug. The subscription model keeps incentives aligned with users, not advertisers.
Business model
Can I donate or contribute?
07.06
Buying Pro or Founder's Edition is the most direct way to support the project financially. Code contributions are welcome on GitHub — we review all PRs. Spreading the word (Reddit, GitHub stars, sharing comparison pages) materially helps too.
Support
08
Troubleshooting — when things go wrong.
6 questions
Why can't I connect to other peers?
08.01
Usually one of these: (1) your firewall is blocking the libp2p ports — try enabling the app through Windows Firewall when prompted; (2) your NAT is particularly aggressive and DCUtR hole-punching isn't working — circuit relay should kick in automatically; (3) the peer you're trying to reach is offline and store-and-forward hasn't resolved yet — messages will deliver when they return. If problems persist, open a GitHub Discussion with your logs.
Connectivity
Voice calls aren't working — what do I check?
08.02
WebRTC calls need: (1) microphone permission in Windows; (2) UDP traffic to STUN/TURN servers; (3) at least one peer that can route the call. If you're on a corporate or school network, UDP is often blocked. On a normal home network, allow OpenDescent through Windows Defender Firewall and it should work. Check that your microphone is selected correctly in Settings.
Calls
How do I report a bug?
08.03
Open an issue on GitHub Issues with: steps to reproduce, expected behaviour, actual behaviour, your OS version, the app version (shown in Settings → About), and any relevant log output. Most bugs get a response within a day or two.
Bugs
Why does Windows show a SmartScreen warning when I install?
08.04
Because the installer isn't yet signed with an Extended Validation code-signing certificate (those cost several hundred pounds per year, and we're working up to it). Windows SmartScreen flags any unsigned installer from a new publisher. Click "More info" → "Run anyway" to proceed. You can also verify the installer's SHA-256 hash against the one listed on the GitHub Releases page before running it.
Install
Where do I report a security issue?
08.05
Please use GitHub Security Advisories for responsible disclosure. We aim to respond within 48 hours on weekdays, coordinate on a disclosure timeline, and credit reporters unless they prefer otherwise. Do not open a public issue for security problems — use the Security tab.
Security
I lost my mnemonic — am I locked out forever?
08.06
If you no longer have both (a) your mnemonic and (b) a device that still has your identity, then yes — the account is gone. This is the trade-off of real end-to-end encryption: the thing that prevents us from reading your messages also prevents us from restoring your account. You can create a new identity and tell your contacts to re-add you. Future releases may include optional social-recovery options (distribute encrypted shards of your key to trusted contacts), but v0.5.4 doesn't have that yet.
Recovery
Still stuck?

Didn't find what you were looking for?

Ask on GitHub Discussions — you'll get a real response from the people who actually built the thing.

Ask

GitHub Discussions

For general questions, feature suggestions, and community conversation. We read everything. Public, but that's often helpful — your question probably helps someone else too.

Open Discussions
Report

GitHub Issues

For specific bugs, crashes, or reproducible problems. Include your OS, app version, and a description of what happened. We triage everything within a couple of days.

Open an Issue
Read enough?

The only real answer is try it yourself.

Free, open source, no account required. The full app is v0.5.4 for Windows.