Private gatherings for public good

Privacy-first event production framework

Plan events, coordinate safely, and keep identities protected by default.

Get Early Access See how it works →

End-to-end encrypted

Chats, files, and sensitive event notes are encrypted on your device before they ever touch our servers.

  • Encryption before upload
  • Zero-knowledge storage
  • Private sharing keys

Pseudonymous by default

Join with a handle. No phone number or real name required.

  • Alias-only sign-up
  • No phone or ID needed
  • Optional identity confirmation

Ephemeral events

Auto-purge modes wipe data on a schedule you control.

  • Temporary data sessions
  • Automatic cleanup
  • Custom retention settings

Coarse location

Share city or geohash, not precise GPS. Delay pins if needed.

  • Approximate event maps
  • Location delay control
  • City-level visibility

Invite-only & roles

From organizers to volunteers and participants: fine-grained access without exposing identities.

  • Invite-only access
  • Role-based permissions
  • Anonymous attendance

Safety lock & rotation

Panic lock, device sign-out, and quick key rotation to contain risk fast.

  • Emergency data purge
  • Quick logout control
  • Key reset in one click