Skip to content

Cwtch — Metadata-Private Group Messenger Guide (2026)

By darklinksMarch 18, 2026Email & Messaging

Type: Decentralized metadata-private messenger — Tor-native

Access: Windows, Mac, Linux, Android

Account required: No personal info — random identifier

Phone number required: No

Central server: None

Tor routing: Default — all connections through Tor

Metadata collected: None

Open source: Yes — fully auditable

Developer: Open Privacy Research Society — Canada

Last verified: March 2026

What Is Cwtch?

Cwtch — pronounced “cutch,” a Welsh word for a small safe hiding place — is a decentralized, metadata-resistant group messaging application developed by the Open Privacy Research Society in Canada. It is designed around a single core principle: no metadata should exist about who communicates with whom, when or how often.

Every connection in Cwtch runs through Tor hidden services. When you send a message, it travels from your device’s Tor hidden service to the recipient’s Tor hidden service — neither party knows the other’s real IP address, and no intermediary server exists to record that the communication happened at all. This architecture places Cwtch among the strongest available tools for metadata-private communication alongside Briar — and ahead of Signal, Session and every other mainstream privacy messenger in terms of metadata protection.

How to Install Cwtch

  1. Download Cwtch from cwtch.im — available for Windows, Mac, Linux and Android
  2. Linux users can install through Flatpak: flatpak install flathub im.cwtch.cwtch
  3. Android users can install via F-Droid — add the Open Privacy repository
  4. Open Cwtch — no registration, no form, no fields
  5. Create a profile — enter a display name only. Use a pseudonym
  6. Cwtch generates a Tor hidden service address as your unique identifier
  7. Wait for Tor to connect — indicated by a status change in the interface

First connection time: Like Briar, Cwtch’s initial Tor connection takes several minutes. Subsequent launches are faster. Desktop users can keep Cwtch running in the background for faster availability.

Cwtch’s Metadata Protection — What Makes It Different

Most encrypted messengers protect message content through end-to-end encryption but leave metadata exposed — who you talk to, when, how often and for how long. This metadata is often more revealing than content. Intelligence agencies have stated that metadata alone is sufficient to build detailed pictures of a person’s relationships, activities and intentions.

Cwtch addresses metadata at the architectural level — not through policy promises but through design choices that make metadata collection technically impossible:

Metadata Type Cwtch Signal Session
Who you talk to ✅ Not knowable ⚠️ Signal sees contact graph ⚠️ Nodes see partial data
When you communicate ✅ Not recorded ⚠️ Logged on servers ⚠️ Node-visible
Your IP address ✅ Hidden — Tor ✅ Hidden if using Signal’s proxy ⚠️ Visible to nodes
Message frequency ✅ Not observable ⚠️ Potentially observable ⚠️ Partially observable
Group membership ✅ Private ⚠️ Known to Signal ⚠️ Partially known

How Cwtch Groups Work

Cwtch’s group messaging architecture is technically novel — it solves the problem of group communication without creating a server that knows all group members.

Groups in Cwtch use a server component — but the server is a simple message relay that knows nothing about the messages it handles. Messages are encrypted before they reach the server, the server cannot read them and it does not know which Cwtch identities are members of the group. The server sees only encrypted blobs arriving and departing — no participant identities, no message content, no communication patterns.

Server operators can be anyone — the Open Privacy team runs public servers, and users can self-host a Cwtch server for maximum control. Running your own Cwtch server for your group eliminates the need to trust any third-party server operator.

Cwtch vs. Briar — The Two Strongest Options

Cwtch and Briar are the two messengers that provide the strongest metadata protection currently available. Both are Tor-native, both have no central server and both are open source. The choice between them depends on specific use case requirements:

Feature Cwtch Briar
Desktop support ✅ Windows, Mac, Linux ⚠️ In development
Async messaging ✅ Yes — via server relay ❌ Both online needed
Offline messaging ❌ No ✅ Bluetooth + WiFi
Group metadata privacy ✅ Strongest ✅ Strong
Self-hostable server ✅ Yes ❌ No server model
iOS support ❌ No ❌ No
Best for Desktop + async group communication Android + offline scenarios

Self-Hosting a Cwtch Server

Running your own Cwtch server for your group provides the strongest available configuration — no third-party server operator has any access to group communication metadata, however limited that access already is on public servers.

Requirements: A Linux server or VPS with Tor installed, Docker or direct installation of the Cwtch server binary and a stable internet connection.

What self-hosting provides:

  • No third-party involvement in group message relay
  • Full control over server retention policies
  • Independence from public server availability and policies
  • The server’s .onion address is known only to group members

What it doesn’t change: Message content is already encrypted before reaching any server — self-hosting does not improve content security. It improves operational security by eliminating a third-party relay operator from the trust chain.

Cwtch’s documentation at cwtch.im covers the server installation process in detail. The server binary is open source and available in the same repository as the client.

Practical Limitations

No iOS support. Like Briar, Cwtch has no iOS app. The combination of Tor hidden service requirements and Apple’s background process restrictions has prevented a production iOS implementation. iOS users must use Session or Signal for privacy messaging.

Smaller user base. Cwtch’s stronger privacy requirements create more friction than mainstream messengers — the result is a smaller user base. Convincing contacts to adopt Cwtch is harder than convincing them to adopt Signal, which is a mainstream recommendation. The tool is most useful in contexts where all participants have a genuine privacy requirement that motivates adoption.

Performance over Tor. All connections run through Tor — this adds latency compared to direct connections or even Session’s node network. Message delivery is slower than Signal or WhatsApp. For real-time chat where speed matters, this is a meaningful limitation.

Active development. Cwtch is actively developed but less mature than Signal or Session. Expect occasional bugs and interface rough edges. Report issues through the Open Privacy project’s channels — it is an actively maintained open source project.

Cwtch for Organizations and Activist Groups

Cwtch’s strongest use case is organized groups — activist collectives, journalist teams, legal support networks and organizations operating in adversarial environments where both content and relationship metadata must be protected.

The group architecture specifically addresses organizational needs:

  • Group membership is not exposed to the server — an adversary who seizes a Cwtch server learns nothing about who is in which group
  • Self-hosted servers eliminate third-party operators entirely from the trust chain
  • Desktop support allows use on organizational computers rather than requiring personal phones
  • No phone number requirement means members can participate without tying their organizational role to their personal phone identity

Canadian Jurisdiction

Cwtch is developed by the Open Privacy Research Society in Canada. Canada is a Five Eyes member — the same intelligence-sharing concern that applies to Session’s Australian jurisdiction. The practical mitigation is similar: Cwtch’s architecture means the Open Privacy team has no access to communications or metadata to hand over under compulsion. There are no message logs, no contact graphs and no IP addresses stored anywhere in the system.

A Canadian legal order against the Open Privacy Research Society yields no useful surveillance data because the data does not exist in a form that can be compelled.

Frequently Asked Questions

What does “Cwtch” mean?

Cwtch is a Welsh word — it means a small storage space, a cubbyhole or a safe hiding place. In South Wales English it also means a cuddle or hug. The name was chosen to reflect the application’s design purpose: a safe, private space for communication. The pronunciation is roughly “cutch” — rhymes with “hutch.”

How does Cwtch compare to Signal for everyday use?

Signal is significantly easier to use, has a larger user base and supports iOS. For everyday communication where your primary concern is message content privacy, Signal is the more practical choice. Cwtch is the stronger tool when metadata privacy — hiding who you communicate with and when — is as important as content privacy. The two tools serve overlapping but distinct use cases. Many privacy-conscious users maintain both: Signal for everyday communication, Cwtch for communication where relationship metadata must be protected.

Can I use Cwtch to communicate with Signal users?

No — Cwtch and Signal use incompatible protocols. There is no bridge between them. Both parties must use Cwtch for Cwtch communication. For cross-platform secure messaging, PGP-encrypted email provides a common format that works between any email clients.

Is Cwtch suitable for large groups?

Cwtch is designed for small to medium groups — a dozen to a few dozen members. Very large groups create performance challenges because Cwtch’s architecture requires more coordination overhead than centralized messaging systems. For large-scale community communication, platforms like Session’s open groups or Briar’s forums provide better scalability at some cost to metadata privacy.

How do I add contacts in Cwtch?

Cwtch generates a unique identifier for your profile — a long Tor hidden service address. Share this identifier with contacts through a secure channel. They add it to their Cwtch client and a connection request goes through Tor. You confirm the request and the contact is added. As with Briar, there is no central directory to search — contacts must be added through direct identifier exchange, which provides an additional layer of protection against unwanted contact from unknown parties.

anonymous group chat torcwtch guide 2026cwtch messengercwtch metadata privacycwtch tor

Post navigation

Briar — Tor-Based Peer-to-Peer Encrypted Messenger Guide (2026)
Kraken — Cryptocurrency Exchange Official Onion Link & Guide (2026)

DarkLinks

Categories

  • Crypto & Finance
  • Darknet Markets
  • Directories & Wikis
  • Email & Messaging
  • Government & Official Services
  • Libraries & Books
  • News & Media
  • Privacy & Security Tools
  • Search Engines
  • Social & Forums

Recent Posts

  • Dark Web Search Engines – Complete Guide
  • Darknet Markets – Complete Directory
  • Privacy & Security Tools – Complete Directory
  • Dark Web Social Networks & Forums – Complete Directory
  • Dark Web Libraries & Books – Complete Directory
  • Dark Web News & Media – Complete Directory
  • Dark Web Email & Messaging – Complete Directory
  • Dark Web Crypto & Finance – Complete Directory
  • Dread Forum — Dark Web Reddit Alternative (2026 Onion Link)
  • Hidden Wiki — Complete Guide & Verified Onion Link (2026)
  • Reddit on the Dark Web — Official Onion Link & Guide (2026)
  • CIA on the Dark Web — Official Onion Link & Guide (2026)
  • Ahmia — Dark Web Search Engine Guide & Onion Link (2026)
  • Torch Search Engine — Dark Web Onion Link & Guide (2026)
  • ProtonMail Dark Web — Official Onion Link & Guide (2026)
  • SecureDrop — Anonymous Whistleblower Platform Onion Link (2026)
  • BBC News Dark Web — Official Onion Link & Guide (2026)
  • New York Times Dark Web — Official Onion Link & Guide (2026)
  • ProPublica Dark Web — Official Onion Link & Guide (2026)
  • The Guardian Dark Web — Official Onion Link & Guide (2026)
  • The Intercept Dark Web — Official Onion Link & Guide (2026)
  • Wasabi Wallet — Bitcoin Privacy Wallet Onion Link & Guide (2026)
  • Imperial Library of Trantor — Dark Web Book Library Onion Link (2026)
  • Facebook Dark Web — Official Onion Link & Guide (2026)
  • Keybase — Encrypted Messaging & File Sharing Onion Link (2026)
  • OnionShare — Anonymous File Sharing Onion Guide (2026)
  • Sci-Hub Dark Web — Free Scientific Papers Onion Link (2026)
  • Z-Library Dark Web — Largest Ebook Collection Onion Link (2026)
  • Tails OS — Anonymous Operating System Guide (2026)
  • Library Genesis — Free Books & Academic Texts Onion Link (2026)
  • Riseup — Privacy Email & VPN for Activists Onion Link (2026)
  • OnionMail — Anonymous Email Inside Tor Onion Link (2026)
  • Bisq — Decentralized Bitcoin Exchange Without KYC (2026)
  • Haveno — Decentralized Monero Exchange Without KYC (2026)
  • Feather Wallet — Monero Desktop Wallet Guide (2026)
  • Cake Wallet — Monero & Crypto Mobile Wallet Guide (2026)
  • Tor Project — Official Website & Onion Link (2026)
  • Whonix — Anonymous Operating System Guide (2026)
  • Qubes OS — Most Secure Desktop Operating System Guide (2026)
  • TorZon Market — Verified Onion Link & Guide (2026)
  • Nexus Market — Verified Onion Link & Guide (2026)
  • Abacus Market — Verified Onion Link & Guide (2026)
  • Flugsvamp 4.0 — Nordic Darknet Market Onion Link & Guide (2026)
  • DarkMatter Market — Verified Onion Link & Guide (2026)
  • Apocalypse Market — Verified Onion Link & Guide (2026)
  • Black Ops Market — Verified Onion Link & Guide (2026)
  • Catharsis Market — Verified Onion Link & Guide (2026)
  • Ares Market — Verified Onion Link & Guide (2026)
  • Moomin Market — Verified Onion Link & Guide (2026)
  • WTN Market — Verified Onion Link & Guide (2026)
  • Prime Market — Verified Onion Link & Guide (2026)
  • Endchan — Anonymous Imageboard Onion Link & Guide (2026)
  • Nanochan — Tor-Native Anonymous Imageboard Guide (2026)
  • Leftychan — Left-Wing Anonymous Imageboard Onion Link & Guide (2026)
  • Hidden Answers — Dark Web Anonymous Q&A Forum Onion Link (2026)
  • MEGA Tor Chat — Anonymous Dark Web Chat Guide (2026)
  • Pitch — Presentation Platform Accessible via Tor (2026)
  • Just Another Library — Dark Web Books & Audiobooks Onion Link (2026)
  • Comic Book Library — Dark Web Comics & Manga Onion Link (2026)
  • Archive Today — Web Archive & Page Snapshot Onion Link (2026)
  • Deep Web Radio — Anonymous Internet Radio via Tor (2026)
  • Amnesty International Dark Web — Official Onion Link & Guide (2026)
  • Mediapart — French Investigative Journalism Onion Link & Guide (2026)
  • Flashlight — Dark Web News Site Onion Link & Guide (2026)
  • DuckDuckGo Dark Web — Official Onion Link & Guide (2026)
  • Not Evil — Dark Web Search Engine Onion Link & Guide (2026)
  • Haystak — Large Index Dark Web Search Engine Onion Link (2026)
  • Candle — Lightweight Dark Web Search Engine Onion Link (2026)
  • VormWeb — Dark Web Search Engine with Authenticity Ratings (2026)
  • SearXNG — Open Source Dark Web Metasearch Engine Guide (2026)
  • Excavator — Dark Web Search Engine Onion Link & Guide (2026)
  • I2P — Anonymous Network Dark Web Guide (2026)
  • Mail2Tor — Anonymous Dark Web Email Service Guide (2026)
  • Tutanota — Encrypted Email Service Dark Web Guide (2026)
  • Session — Anonymous Encrypted Messenger Guide (2026)
  • Briar — Tor-Based Peer-to-Peer Encrypted Messenger Guide (2026)
  • Cwtch — Metadata-Private Group Messenger Guide (2026)
  • Kraken — Cryptocurrency Exchange Official Onion Link & Guide (2026)
  • Last updated: 
  • March 18, 2026
  • - Links verified manually -
  • - Submit a link -
  • - Report a dead link -

darklinks

Close menu
  • Home