How Encryption Works

Last updated: March 15, 2026

The short version: When you use end-to-end encryption on DiscAlt, your messages are encrypted on your device before they leave it. The server never sees the plaintext. Only the intended recipients can read what you send.

What is End-to-End Encryption?

End-to-end encryption (E2EE) means your messages are scrambled into unreadable data on your device and only unscrambled on the recipient's device. The DiscAlt server relays the encrypted data but cannot decrypt it. Even if someone gained access to our servers, they would see only gibberish.

Where E2EE is Available

How It Works — The Basics

When you create a DiscAlt account, your device generates a set of cryptographic keys — long strings of random data used for encryption. Your private keys never leave your device. Your public keys are uploaded to the server so other people can send you encrypted messages.

When you message someone for the first time, the two devices perform a key exchange — a mathematical process that lets both sides agree on a shared secret without ever transmitting that secret over the network. From that point on, every message is encrypted with a key derived from this shared secret.

Forward Secrecy

DiscAlt doesn't just use one key for all your messages. The encryption keys change with every message through a process called ratcheting. Each message gets its own unique key, and old keys are deleted after use.

This means that even if an attacker somehow obtains a key for one message, they cannot use it to decrypt any other message — past or future. This property is called forward secrecy.

Sealed Sender

In standard encrypted DMs, the server knows who sent a message (so it can deliver it), even though it can't read the content. With sealed sender, even the sender's identity is encrypted inside the message itself. The server sees only that a message was sent to a particular conversation — it does not know which participant sent it.

The recipient decrypts the sealed envelope to learn who the message is from, then decrypts the message content as usual.

Group Encryption

In encrypted space channels, each participant generates a sender key — a symmetric encryption key shared with all other members of the channel. When you send a message, it's encrypted once with your sender key rather than individually for each recipient. This makes group encryption efficient regardless of how many people are in the channel.

Sender keys are distributed to other members through the same secure pairwise channels used for DMs, so the server never sees them.

Key Verification

To confirm you're actually communicating with the person you think you are (and not an impersonator), DiscAlt lets you compare key fingerprints. Each device has a unique fingerprint derived from its identity key. You can compare fingerprints with someone over a phone call, in person, or through any trusted channel. If they match, you know the encryption is secure between your specific devices.

What the Server Can and Cannot See

The server cannot see:

The server can see:

Your Keys, Your Devices

Your encryption keys live in your browser's local storage. They are not stored on the server in a way that the server can read. This means:

What E2EE Does Not Protect Against

Encryption is a powerful tool, but it's important to understand its limits:

The Cryptography

For those interested in the technical details, DiscAlt's encryption is built on well-established, peer-reviewed cryptographic protocols:

These are the same families of protocols and primitives used by Signal and other respected encrypted messaging systems.

Questions?

If you have questions about how DiscAlt protects your data, reach out at security@discalt.com.