Ndevar logoNdevar

How it works

The network is the people.

No towers. No infrastructure. No company in the middle. Ndevar routes messages through nearby devices using Bluetooth — and falls back to the internet relay only when needed.

Scenario 1

Pure Bluetooth

No internet. No Wi-Fi. No signal at all. Your message travels from device to device via Bluetooth until it reaches the recipient.

You
Jamie

Bluetooth, not Wi-Fi

Ndevar uses Bluetooth to communicate with nearby devices — no Wi-Fi network or hotspot required.

Each device relays

Every device running Ndevar participates in routing automatically, in the background.

Store and forward

If the recipient isn't immediately reachable, devices store the message briefly and deliver it when a route becomes available.

Scenario 2

Hybrid mode

You have no signal, but a nearby device does. That device acts as a bridge — carrying your message from Bluetooth onto the internet relay to reach someone far away.

You
RELAY
Jamie

Automatic bridging

Devices with internet access automatically bridge Bluetooth traffic onto the relay — no configuration needed.

The internet relay

The Ndevar relay forwards encrypted envelopes to recipients. It cannot read them. Messages are never stored after delivery.

Push notifications

If the recipient has push notifications enabled, they're woken up when the message arrives via relay.

Scenario 3

Internet relay

Both devices online, anywhere in the world. Messages route through the relay server — fully encrypted. The relay never sees the content.

You
RELAY
Jamie

Any distance, same privacy

Sydney to London uses the same encryption as Bluetooth to the next table. Distance doesn't affect privacy.

Zero relay storage

The relay discards the envelope immediately after delivery. Nothing is kept on the server.

Broadcast over relay

Broadcast channels use the relay to reach subscribers anywhere in the world, not just those nearby.

Scenario 4

Encryption & privacy

Every message is encrypted on your device before it leaves. Not even Ndevar can read your messages — by design, not policy.

Your device
composes message
Key exchange
X25519 ECDH
Encryption
AES-256-GCM
Signature
Ed25519
Recipient
decrypts locally
With Ndevar stealth addressing
  • Sender identity zeroed
  • One-time recipient token per message
  • Relay sees only an encrypted envelope

Stealth addressing — how it works

1
Your device generates a one-time keypair for each message
2
The public key is included in the envelope — not your identity
3
Recipient derives the destination token using their private key
4
Nobody else can derive this token — not even Ndevar's relay
Scenario 5

Sharing settings

You control exactly what a contact can see about you. Nothing is shared without your explicit permission.

Sharing fully off

You're anonymous. A contact only sees your 8-character address.

They can't:
  • See a name, photo or profile
  • Save you with a nickname
  • Share your details with anyone else
  • See your location
Sharing fully on

Per-contact and opt-in. You choose what each contact can see.

They can, for example:
  • See your display name and photo
  • Save you with a nickname in their contacts
  • Refer you to another contact
  • See your live location while you share it

Ready to try it?

No account required. Works out of the box.

Download for iOS — it's free