The P2P Privacy Model: Zero Trust, Zero Servers
How Zap's peer-to-peer architecture ensures your conversations and data never leave your physical space. A deep dive into our security model.
Zap Team
Security
Privacy shouldn't be a policy; it should be an architecture. At Zap, we built a Zero Trust, Zero Server model that ensures your data remains physically yours.
Beyond Encryption
Most apps talk about "End-to-End Encryption" (E2EE), but they still route your encrypted blobs through their servers. In Zap, there is no server. When you share a document with a teammate, it travels directly from your device to theirs over a localized mesh network.
The Security Pillars of Zap
•Physical Air-Gap Capability — Zap works entirely without an internet connection. If your devices are in the same room, they can communicate.
•Secure Enclave Integration — We use Apple's Secure Enclave to manage identity keys, ensuring that even if your OS were compromised, your Zap identity remains protected.
•On-Device Only — No telemetry, no logs, and no "anonymous" snippets ever leave your device.
By removing the middleman, we remove the most common point of failure in modern security: the central database.