Trust Center

Security, Transparency & Member Safety

Digital Freedom Tools

We believe in a free and open internet. Here are the tools we recommend and support to help Iranians access uncensored information and communicate securely.

>_
Secure Messaging

BitChat — Decentralized Encrypted Messaging

BitChat is a peer-to-peer, end-to-end encrypted messenger that works without centralized servers. No phone number required, no metadata collected. Your conversations remain truly private.

Download BitChat
If You're Outside Iran
[↗]

Set Up a Conduit Node

Conduit is a relay system that allows you to donate your bandwidth to help people inside Iran bypass internet censorship. By running a Conduit node on your computer, you create a secure bridge that routes traffic for those who are blocked. No technical expertise required — just install and run.

Every node makes a difference. Help expand the network of freedom.

Set Up Conduit
If You're Inside Iran
[◇]

Use Psiphon to Access Free Internet

Psiphon is a trusted circumvention tool used by millions to bypass state-imposed internet filtering and shutdowns. It combines VPN, SSH, and HTTP proxy technology to give you unrestricted access to the open internet.

Always download Psiphon from official sources. Share the link with people you trust.

Download Psiphon
[!]

Safety Notice

Always use these tools responsibly. Enable your device's security features, keep software updated, and never share your identity or credentials on untrusted platforms.

[Ø]

No-Logs Policy

We do not store IP addresses, session data, or browser fingerprints. Your privacy is our priority.

[◆]

End-to-End Encryption

All sensitive data is encrypted at rest using industry-standard protocols.

[✓]

Security Audits

Regular independent security audits ensure our infrastructure meets global standards.

[◎]

Secure Jurisdiction

Your data is stored in jurisdictions that provide maximum legal protection for privacy.

[■]

Security Assurance

Industry-Standard Privacy & Encryption

✓ ISO 27001
✓ SOC 2 Type II
✓ E2E Encrypted

Transparency & Compliance

Quarterly Reports

We maintain a public transparency report updated quarterly with detailed metrics.

Government Requests

All government data requests are logged and reported to members immediately.

Data Protection

Member data is never sold, shared, or traded with third parties under any circumstances.

Independent Audits

Third-party security audits conducted annually by leading cybersecurity firms.