Cyph icon
Cyph icon

Cyph

 12 likes

Quantum-resistant encrypted messaging, video/audio calls, and file transfers in the browser with optional registration and no downloads required.

Cyph screenshot 1

License model

  • FreemiumOpen Source

Country of Origin

  • US flagUnited States

Platforms

  • Mac
  • Windows
  • Linux
  • Online
  • Android
  • iPhone
  • iPad
  No rating
12likes
0comments
0news articles

Features

Suggest and vote on features

Properties

  1.  Privacy focused
  2.  Security-focused

Features

  1.  End-to-End Encryption
  2.  PGP Encryption
  3.  Encrypted Chat
  4.  Secure Chat
  5.  Web-Based
  6.  Video Calling
  7.  Telehealth
  8.  Secure File Sharing
  9.  Anonymous Secure Filesharing

 Tags

Cyph News & Activities

Highlights All activities

Recent News

No news, maybe you know any news worth sharing?
Share a News Tip

Recent activities

Show all activities

Cyph information

  • Developed by

    US flagCyph, Inc.
  • Licensing

    Open Source and Freemium product.
  • Pricing

    Subscription that costs up to $27 per month + free version with limited functionality.
  • Written in

  • Alternatives

    45 alternatives listed
  • Supported Languages

    • English

AlternativeTo Categories

Security & PrivacySocial & CommunicationsFile SharingSport & Health

GitHub repository

  •  373 Stars
  •  61 Forks
  •  14 Open Issues
  •   Updated Mar 22, 2024 
View on GitHub

Popular alternatives

View all

Our users have written 0 comments and reviews about Cyph, and it has gotten 12 likes

Cyph was added to AlternativeTo by cyph on Mar 28, 2017 and this page was last updated Apr 15, 2025.
No comments or reviews, maybe you want to be first?
Post comment/review

What is Cyph?

Cyph is a secure communication tool designed to be extremely friendly for users of any technical skill level, providing such features as encrypted video calling and file transfers to both individuals and businesses. The patent-pending technology underpinning our software was built by two former SpaceX engineers — and rigorously vetted against a threat model focused on nation-state-level attacks — with the vision of defending innocent people from increasingly sophisticated rogue hackers and invasive government mass surveillance.

Official Links