We Trust in Zentalk


Zentalk is a highly secure hybrid encryption decentralized peer-to-peer messenger. Next to great usability, under the hood, you’ll find state-of-the-art encryption with AES-256, Diffie-Helman, RSA and El-Gamal security and since it’s decentralized, without having a server-point Zentachain guarantees full anonymity and offline communication between sender and receiver using the Blake2b hashing function and the Tor-network. Zentalk is designed to be completely private, secure and most importantly - censorship-resistant. Unlike other messenger services, Zentalk doesn't store or backup your data. It enables people to communicate privately, without third party dependence, centralized servers or secret data backups and also it will cover you from middle-men attack. Zentalk achieves its top-tier encryption and privacy standards through the integration of Zentamesh networking technology. This gives Zentalk the unique advantage of being virtually immune against any forms of hacking or data manipulation The Zentachain development team is committed to protecting your integrity by providing you with the absolute highest quality in safeguard technology.

Offline Communication

In case of emergency, the user is able to stay connected to Zentalk without having internet access. (Offline to Offline)

Secure Hashing Encryption

Zentalk will execute first-class encryption while sending and receiving messages. Only the sender and recipient can view private messages end to end with a Hashing function Blake2.

Multiple languages

Zentalk will be supported in multiple languages to help and understand Zentalk.


Zentalk protects your communication protocol from large companies that have your message protocol and sells it to large companies for their marketing purposes.

Other-Messengers doesnt pay

Zentalk rewards user with Zenta token supporting and host a Zentanode for forwarding the messages in the Zentamesh network.



A meshed network is a network topology in which each node relays on the data for the network. Zentachain implements .cjdns- nodes an encrypted IPv6 network using public-key cryptography for addressing allocation and a distributed hash table for routing. This provides near-zero-configuration networking and prevents many of the security and scalability issues that plague existing networks. All meshed nodes cooperate in the distribution of data in the network. Devices that use Zentalk act as nodes on the Zentamesh. These nodes have the unique ability to interconnect with one another in a distributed fashion. Meshed networks can relay messages using either a flooding technique or a routing technique. With routing, the message is propagated by hopping from one node to another node until it reaches its destination. To ensure all the availability of the path the network must allow for continuous connections and must reconfigure itself around broken paths, using self-healing algorithms such as Shortest Path Bridging. Self-healing allows a routing-based network to operate when a node breaks down or when a connection becomes unreliable. As a result, the network is typically quite reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless situations, this concept can also apply to wired networks and to software interaction. An example of common meshed network technology used in everyday life would be wireless domotica (like the Z-wave protocol). When you register a new node in the house and let’s say a new light bulb, the device pairs with the control center through a self-configured meshed network. Each new device is a new node in the Zentamesh and relaying the data communication. Mesh-networks are typically wireless - however Zentachain Meshnet is about the blockchain-based network topology and less about infrastructure. Zentalk achieves technological darkness it means no metadata can be discovered about its users or their messages. This is achieved through the integration of the Meshnet and its architecture. Zentalk pushes, drags and tunnels all messages and data through the Zetamesh. This ensures that any messages shared between the sender and recipient have the highest levels of privacy. In a meshed network, each network node is connected to one or more nodes. When multiple nodes are interconnected, this is known as a fully meshed network. When a message is sent from Zentalk, the data is sent through the Zentamesh and is passed from one node to the next, until the message has reached the desired recipient. By design nodes in the Zentamesh don't know which node has sent the message or exactly which node are receives the message. This leads to total anonymity for or sender and recipient. The sender uses 1 node to get to its receiver. This one node will be rewarded in ZENTA to deliver the encrypted message. If there are not many nodes available in your area so Zentalk will be connected over the Tor network to arrive the message.

Zentalk VS Other-Messengers

We let the users be the judge.

Zentalk vs Other-Messengers img
  • Zentalk will never collect Metadata.

  • User contact-list are secure encrypted and stored on only own device.

  • Zentalk is entirely highly encrypted Peer-to-Peer with BLAKE2 Hash function Algorithm(Algorithmfunction).

  • Zentalk will be not support screenshots it will be blocked.

  • Zentalk is protecting an Anti-middle-man attack.

  • Zentalk doesn't have a backup-space and also message are not stored on a server or cloud-based server.

  • When you forget your password you can not recover your Account.

  • Identity and IP-Address are protected and with the Tor-Protocol.

  • The user is able to stay connected to Zentalk without having internet access.

  • Zentalk supports button to destroy the application and removing the account.

  • Zentalk pays you with Zenta Token if supporting our network to transfer offline messages with Zentanode.

  • Other-Messengers tracks all your Metadata.

  • Other-Messengers access your location anytime.

  • Other-Messengers stores your chats and history on their own database.

  • No encryption Timestamps, text, from and to names, phone numbers, paths to attachments.

  • Other-Messengers doesnt pay you.

  • Since Other-Messengers is part of Facebook, data is shared with the social network - even if you do not have a Facebook account.

  • Identity thief with a single missed call over Other-Messengers can controls your device and collect all your information.

  • Backup messages are not encrypted attacking by middlemen is anytime possible by manipulating the sender and receiver encryption.

  • In a emergency user can't use Other-Messengers Offline to Offline.

  • Identity and IP-Address are not protected over Other-Messengers.

2020 © Zentachain