We Trust in Zentalk


Zentalk is a highly secure hybrid encryption decentralized peer-to-peer messenger. Next to great usability, under the hood, you’ll find state-of-the-art encryption with AES-256, Diffie-Helman, RSA and El-Gamal security and since it’s decentralized, without having a server-point Zentachain guarantees full anonymity and offline communication between sender and receiver using the Blake2b hashing function and the Tor-network. Zentalk is designed to be completely private, secure and most importantly - censorship-resistant. Unlike other messenger services, Zentalk doesn't store or backup your data. It enables people to communicate privately, without third party dependence, centralized servers or secret data backups and also it will cover you from middle-men attack. Zentalk achieves its top-tier encryption and privacy standards through the integration of Zentamesh networking technology. This gives Zentalk the unique advantage of being virtually immune against any forms of hacking or data manipulation The Zentachain development team is committed to protecting your integrity by providing you with the absolute highest quality in safeguard technology.

Offline Communication

In case of emergency, the user is able to stay connected to Zentalk without having internet access. (Offline to Offline)

Secure Hashing Encryption

Zentalk will execute first-class encryption while sending and receiving messages. Only the sender and recipient can view private messages end to end with a Hashing function Blake2.

Multiple languages

Zentalk will be supported in multiple languages to help and understand Zentalk.


Zentalk protects your communication protocol from large companies that have your message protocol and sells it to large companies for their marketing purposes.

Other-Messengers doesnt pay

Zentalk rewards user with Zenta token supporting and host a Zentanode for forwarding the messages in the Zentamesh network.


Zentamesh Network

The Zentameshnet has self-healing properties that contribute to the ability to achieve censorship resistance. Self-healing means if a node connection is blocked or disabled, the mesh network can patch and rerouted around the lost node. The data is redirected and the network is still functional. Meshed networks can be applied to both wired and wireless networks, as well as Zentalk will establish a meshed WLAN (Wireless Local Access Network). This MWLAN can be achieved thanks to the use of a Zentanode Meshed-network. This will be required for offline communications over Zentalk.

Why Choose Zentalk?

You are the Network!

  • Zentalk will never collect Metadata.

  • User contact-list are secure encrypted and stored on only own device.

  • Zentalk is entirely highly encrypted Peer-to-Peer with BLAKE2 Hash function Algorithm(Algorithmfunction).

  • Zentalk will be not support screenshots it will be blocked.

  • Zentalk is protecting an Anti-middle-man attack.

  • Zentalk doesn't have a backup-space and also message are not stored on a server or cloud-based server.

  • When you forget your password you can not recover your Account.

  • Identity and IP-Address are protected and with the Tor-Protocol.

  • The user is able to stay connected to Zentalk without having internet access.

  • Zentalk supports button to destroy the application and removing the account.

  • Zentalk pays you with Zenta Token if supporting our network to transfer offline messages with Zentanode.

  • Other-Messengers tracks all your Metadata.

  • Other-Messengers access your location anytime.

  • Other-Messengers stores your chats and history on their own database.

  • No encryption Timestamps, text, from and to names, phone numbers, paths to attachments.

  • Other-Messengers doesnt pay you.

  • Since Other-Messengers is part of Facebook, data is shared with the social network - even if you do not have a Facebook account.

  • Identity thief with a single missed call over Other-Messengers can controls your device and collect all your information.

  • Backup messages are not encrypted attacking by middlemen is anytime possible by manipulating the sender and receiver encryption.

  • In a emergency user can't use Other-Messengers Offline to Offline.

  • Identity and IP-Address are not protected over Other-Messengers.

2020 © Zentachain