Security

Private by design.
Not by policy.

Most apps promise privacy through policy. Zap makes breaches structurally impossible — because there is no server to breach.

Zero Server Architecture

Zap has no central server that stores your data. Peer-to-peer means your data flows directly between devices, with no middleman that can be hacked, subpoenaed, or compromised.

End-to-End Encryption

All peer-to-peer communication is encrypted using modern cryptographic protocols. Only the intended recipients can decrypt data — not Zap, not your ISP, not anyone else.

On-Device AI Processing

AI inference runs entirely on Apple Silicon. Your prompts, transcripts, and documents never leave your device to reach a cloud AI endpoint. There is nothing to intercept.

Apple Secure Enclave

Sensitive keys and credentials are stored in Apple's Secure Enclave — a dedicated security chip that is physically isolated from the rest of the processor.

No Telemetry by Default

Crash reporting and analytics are opt-in only. We collect nothing without your explicit consent, and what you share is anonymized and never linked to your identity.

Open Security Model

Our cryptographic protocols and security architecture are publicly documented. We welcome security researchers to review and report findings responsibly.

Responsible Disclosure

Found a security vulnerability? We take every report seriously and work to address issues promptly. Please disclose responsibly so we can protect our users.

Report a Vulnerability