What Ping defends against, what it does not, and where it stands relative to the field. No overclaims. No marketing.
Every threat model begins with the adversary. Not all attackers are equal.
Ping's defenses are designed to escalate with the threat.
A curious roommate, a café sniffer, an ISP logging DNS queries, or a relay operator inspecting traffic. They can observe encrypted traffic but cannot compel cooperation from endpoints or infrastructure.
Ping: fully defendedA compromised relay operator, a hostile CDN, a man-in-the-middle on the network path, or a Telegram infrastructure breach. They control parts of the delivery chain and can modify, delay, or drop traffic. They may attempt to correlate metadata across sessions.
Ping: structurally defendedA nation-state with legal authority to compel cooperation, conduct targeted device exploitation, deploy zero-day attacks against endpoints, or perform global traffic analysis. They can seize hardware, install spyware, or operate at the OS level below the application layer.
Ping: partially defendedThese are the attack surfaces Ping was explicitly built to neutralize.
All traffic is end-to-end encrypted with ChaCha20-Poly1305. Key exchange via X25519. An observer on the network sees only encrypted Nostr events with no readable content, no participant names, no conversation structure.
Messages are padded to power-of-two bucket sizes (256B → 512KB) before encryption. Sensitive operations are wrapped in privacy envelopes, a second encryption layer that hides both content and operation type. Message length reveals nothing.
No accounts. No phone numbers. No email. No registration. Identity is a locally-generated secp256k1 keypair. Relays see encrypted blobs with Nostr event metadata but cannot map events to real-world identities or reconstruct conversation graphs.
There is no server. Ping uses a decentralized multi-relay Nostr architecture. Compromising a relay yields only encrypted events that the relay was never able to read. No message logs. No user database. No keys. Nothing to take.
Sender keys ratchet forward after each message via HMAC-SHA256 chain derivation. Keys rotate every 100 messages or on any membership change. Compromising a current key does not decrypt past messages.
A subpoena to Ping returns nothing. There is no message store, no user directory, no metadata log. The architecture is not resistant to legal requests by policy, it is resistant by the absence of data. You cannot hand over what does not exist.
No system is invulnerable. Acknowledging limitations is not weakness, it is precision.
These are the attack surfaces Ping does not fully address.
Compared through threat categories, not feature checklists. This is not a sales pitch.
Every product in this table has made meaningful contributions to private communication.
| Threat Category | Signal | Session | Briar | Ping |
|---|---|---|---|---|
| End-to-end encryption | Yes | Yes | Yes | Yes |
| No phone / email required | No | Yes | Yes | Yes |
| Decentralized infrastructure | No | Partial | Yes | Yes |
| No server-side message store | Queued | Swarm TTL | Yes | Yes |
| Metadata resistance | Sealed sender | Onion routing | Tor-based | Multi-relay, padded |
| Traffic analysis resistance | Block padding | Partial | Tor timing | Bucket padding |
| Forward secrecy | Double Ratchet | Session protocol | Bramble | Chain ratchet |
| Survives server seizure | Centralized | Swarm nodes | No server | No server |
| Subpoena yields data | Limited metadata | Minimal | Nothing | Nothing |
| Cross-platform | Yes | Yes | Android only | Yes |
Where messages live, who can access them, and what a breach actually yields.
| Data at Rest | Signal | Session | Briar | Ping |
|---|---|---|---|---|
| Messages stored on server | Never. Store-and-forward, deletes after delivery | Never. Decentralized swarm, deleted after retrieval | Never. P2P, no server | Never. Relays see only encrypted blobs, no storage by design |
| Messages stored on device | Yes. Full history persisted | Yes. Persisted on device | Yes. Persisted on device | No. Ephemeral by default |
| Cloud backup exposure | Optional. Encrypted backup to Signal servers or local file | None | None | None |
| Data available to compromise | High. Full conversation archive on device | Moderate. Device archive exists | Moderate. Device archive exists | Near zero. Messages exist only in memory during active session |
| Forward secrecy relevance | Critical. Archive must be protected against key compromise | Relevant. Device seizure is the threat | Relevant | Low. Nothing to retroactively decrypt |
Ping does not claim to be the most secure messenger ever built.
It claims to be honest about its architecture and uncompromising in its defaults.
For a deeper look at the encryption architecture, see the Overview. For the philosophy behind Ping's entropy model, read the Entropy Thesis.