Skip to the content
  • Home
    Why STIX
    Experience the future of secure communication via military-grade encryption.
    Features
    Explore the limitless possibilities of private communication.
    Who is using STIX
    Our clients are the most demanding institutions and individuals.
    Roadmap
    We are here for the long run. Discover our future developments
    Your Data, Your Rules
    Gain control over your communications and data
    Sign up
  • How it works
  • Quick start
  • FAQs
  • Blog
Login
  • Home
    Home
    Why STIX
    Experience the future of secure communication via military-grade encryption.
    Features
    Explore the limitless possibilities of private communication.
    Who is using STIX
    Our clients are the most demanding institutions and individuals.
    Roadmap
    We are here for the long run. Discover our future developments
    Your Data, Your Rules
    Gain control over your communications and data
    Sign Up
  • How it works
  • Quick start
  • Status page
  • FAQs
  • Blog
Home
How It Works
How It Works

Stix is a messaging app created for activists, journalists, and anyone seeking a secure, simple, and reliable way to communicate. Unlike conventional messaging apps, Stix operates without a central server—messages are synchronized directly between users’ devices. If the internet is unavailable, Stix can sync through Bluetooth, Wi-Fi, or memory cards, ensuring information continues to flow during a crisis. When the internet is accessible, Stix syncs via the Tor network, safeguarding users and their connections from surveillance.

 

The quick start guide and the manual explain how to use Stix and detail the features it offers.

Stix utilizes direct, encrypted connections between users to prevent surveillance and censorship.

Traditional messaging software depends on central servers, making messages and relationships vulnerable to surveillance.

Stix can share data through Wi-Fi, Bluetooth, and the Internet.

Stix offers private messaging, public forums, and blogs that are safeguarded against the following surveillance and censorship threats:

  • Metadata surveillance. Stix uses the Tor network to prevent eavesdroppers from discovering which users are communicating with each other. Each user’s contact list is encrypted and stored on their own device.
  • Content surveillance. All communication between devices is encrypted end-to-end, protecting the content from being intercepted or altered.
  • Content filtering. Stix’s end-to-end encryption blocks keyword filtering, and its decentralized design ensures there are no servers to block.

 

 

  • Takedown orders. Every user subscribed to a forum retains a copy of its content, eliminating any single point where a post can be removed.
  • Denial of service attacks. Stix forums operate without a central server, and every subscriber retains access to the content even when offline.
  • Internet blackouts. Stix can function over Bluetooth and Wi-Fi, maintaining the flow of information during outages.

Stix is designed to resist surveillance and censorship by an adversary with the following capabilities:

  • All long-range communication channels (internet, phone networks, etc.) are fully monitored by the adversary.
  • The adversary can block, delay, replay, and modify traffic on long-range communication channels.
  • The adversary has limited capability to monitor short-range communication channels (Bluetooth, Wi-Fi, etc.).
  • The adversary has limited ability to block, delay, replay, and modify traffic on short-range communication channels.
  • The adversary can deploy an unlimited number of devices running Stix.
  • Some users can keep their devices secure—those who can’t are treated, for the purposes of this threat model, as being under the adversary’s control.
  • The adversary has limited capacity to persuade users to trust its agents, restricting the number of social connections between the adversary’s agents and the rest of the network.

 

Our long-term vision extends well beyond messaging: we aim to leverage Stix’s data synchronization capabilities to support secure, distributed applications like crisis mapping and collaborative document editing. Our ultimate goal is to empower people in any country to create safe spaces for open debate, event planning, and organizing social movements.

News letter
Sign up to get all the latest AIZAN news, website updates, offers and promos.
Prevent this Pop-up
  • Home
  • Our values
  • How it works
  • Quick start
  • Blog
  • Open source
  • Contacts
info@stix.im
©2025 STIX. All Rights Reserved.
Terms Of Services|Privacy Policy|Cookie Policy