Trust Center
Security, Transparency & Member Safety
Digital Freedom Tools
We believe in a free and open internet. Here are the tools we recommend and support to help Iranians access uncensored information and communicate securely.
BitChat — Decentralized Encrypted Messaging
BitChat is a peer-to-peer, end-to-end encrypted messenger that works without centralized servers. No phone number required, no metadata collected. Your conversations remain truly private.
Download BitChat ↗Set Up a Conduit Node
Conduit is a relay system that allows you to donate your bandwidth to help people inside Iran bypass internet censorship. By running a Conduit node on your computer, you create a secure bridge that routes traffic for those who are blocked. No technical expertise required — just install and run.
Every node makes a difference. Help expand the network of freedom.
Set Up Conduit ↗Use Psiphon to Access Free Internet
Psiphon is a trusted circumvention tool used by millions to bypass state-imposed internet filtering and shutdowns. It combines VPN, SSH, and HTTP proxy technology to give you unrestricted access to the open internet.
Always download Psiphon from official sources. Share the link with people you trust.
Download Psiphon ↗Safety Notice
Always use these tools responsibly. Enable your device's security features, keep software updated, and never share your identity or credentials on untrusted platforms.
No-Logs Policy
We do not store IP addresses, session data, or browser fingerprints. Your privacy is our priority.
End-to-End Encryption
All sensitive data is encrypted at rest using industry-standard protocols.
Security Audits
Regular independent security audits ensure our infrastructure meets global standards.
Secure Jurisdiction
Your data is stored in jurisdictions that provide maximum legal protection for privacy.
Security Assurance
Industry-Standard Privacy & Encryption
Transparency & Compliance
Quarterly Reports
We maintain a public transparency report updated quarterly with detailed metrics.
Government Requests
All government data requests are logged and reported to members immediately.
Data Protection
Member data is never sold, shared, or traded with third parties under any circumstances.
Independent Audits
Third-party security audits conducted annually by leading cybersecurity firms.