>> Choose your username and click the "Sign Up" button.
* Register or log in without revealing any personal information. You just need to remember your username and keep your private key safe. By using this service, you agree to the Terms Of Use.
>> Enter your username and click the "Select Your Private Key" button.
* This is your primary sign-in device. If you need to sync your sign-in information across multiple devices, request a token by clicking the "Request Token" button. When the generated four-digit number appears on the screen of this device, click the "Sync" tab on your other device, enter the digits in the appropriate field and click the "Submit" button. This will allow you to access the system from that other device without actually logging in.
>> Enter the 4-digit number you received from your primary sign-in device and click the "Submit Token" button.
* Submit a token if this is one of the devices you need to access the system from.
0%
UPLOAD IN PROGRESS
>> All fields are required. Selecting a file or adding a signature is optional. Once ready, click the "Send Message" button.
0%
UPLOAD IN PROGRESS
>> Choose whether you want to record video or audio and click the "Request Stream" button.
>> Record:
Video
Audio
>>
00
:
00
:
00
:
00
* If the live video doesn't show up, click inside the box above.
#Start A Video Chat
To start a video chat with end-to-end encryption, please visit this page.
0%
UPLOAD IN PROGRESS
>> Enter the username and click the "List Messages" button.
>> Please download the encrypted file in its entirety before decrypting it.
>> No file attached to the message
#Learn more
A digital telegram is an electronic message of significant importance that conveys sensitive, confidential, or private information. It contains a text, audio, or video message and, optionally, an attached file of up to 32 MB in size.
Powered by Digital Chip Card Locker ("DCCL") technology, digital telegrams are a more secure alternative to emails, chat apps, and regular contact forms on websites.
For more details and the algorithms behind digital telegrams, please visit this page.
#How it works
ChatLiner is an open source platform for sharing and storing sensitive, confidential or private information based on Digital Chip Card Locker ("DCCL"), a brand new technology that sets the highest standards for cybersecurity and preventive data protection.
For example, digital telegrams are encrypted and digitally signed using this technology.
Events on the platform are governed by four layers of security that are closely intertwined and complementary.
1. Two-Factor Verification
DCCL utilizes two-step authentication to verify your digital identity. While entering your username is the first step, the second step is selecting a uniquely generated file that was saved to your device upon registration.
This is also a perfect way to activate reliable protection against automated bot activity.
2. Passwordless Authentication
Two-factor verification implemented by DCCL is based on passwordless authentication.
Instead of dealing with a traditional password in terms of remembering, typing, analyzing its strength, and, ultimately, forgetting it, we will authenticate using its more secure and convenient digital equivalent in the form of a passkey, which is a combination of digital signatures, fragments of cryptographic key pairs, encryption keys, hash codes and device identification strings.
3. End-To-End Encryption
End-to-end encryption defines communication in such a way that the raw data is encrypted on the sender side and decrypted on the receiver side, with no possibility for anyone else to intercept and decrypt it.
DCCL enables end-to-end encryption in the truest sense of the word, making it open source, transparent, and easy to use.
4. Login Data Synchronization
Using the same username on different devices when logging in can pose a security risk.
DCCL introduces tokenization with alphanumeric typing as a principle for synchronizing credentials across multiple devices and preventing compromise of sensitive, confidential, or private information.
The characters are displayed on the screen of the primary device and entered as a value into the appropriate field on the screen of the other device requesting login permission.