2alo
Absolute security for
your chats
Messages are encrypted end-to-end. Only you and the recipient can read them. If you lose the key, you can't read old messages!
Download NowWhy Choose 2alo?
Maximum security
Messages are encrypted end-to-end
No one else reads your message
Only you and the recipient can read them. If you lose the key, you lose the account and no one can read the message!
Application Owner does not know what you chat
We (the application owner) even own a database, but we do not know what you are chatting about!
Security Mechanism
Only you and the recipient have the key to read the message. Data is encrypted with your key before being sent to the network. Data in the Database is encrypted. Application Owner do not know what you are chatting about!
Did you know?
Millions of messages are displayed outside every day!
More than 2.6 billion text messages were leaked last year, causing billions of dollars in damage and affecting the privacy of millions of people.
Shocking figures
The Risk of Not Using End-to-End Encryption
Not using end-to-end encryption means:
- Your data may be read by third parties.
- The app owner can access your content.
- Your messages can easily be leaked if the server is hacked.
Without end-to-end encryption, your conversations aren't really yours!
Solution - 2alo
2alo protects you with end-to-end encryption technology. Your data belongs only to you, even we (apps owner) can't access it!
Protect your messages now!Privacy Policy
This Privacy Policy describes how 2alo (“we”, “us”, or “our”) collects, uses, and protects information when you use the 2alo messaging application (the “Service”). 2alo is designed and operated using End-to-End Encryption (E2EE), with the primary goal of protecting user privacy and ensuring maximum data confidentiality.
1. Core Privacy Principles
- We cannot access the content of your messages, calls, shared files, or communications.
- All communications between users are protected using end-to-end encryption, meaning only the sender and intended recipient can decrypt the content.
- 2alo servers do not store encryption keys and have no technical ability to decrypt user content (zero-knowledge architecture).
2. Information We Do Not Collect
- Message content, voice calls, video calls, or shared files
- Encryption keys for user communications
- Personal contact lists stored on your device, unless explicitly permitted by the user
- Audio, image, or video data outside encrypted transmission
- Advertising data, tracking data, or behavioral analytics
3. Minimal Technical Information
- Network connection information (such as IP address at the time of connection)
- Basic device information (operating system, app version)
- Encrypted routing data required for message delivery
- Not used for advertising
- Not used for user profiling or behavior tracking
- Not linked to message content
4. Log Data
- Do NOT contain encrypted message content
- Are processed only for operational and security purposes
- Are retained for the shortest period necessary
5. Third-Party Service Providers
- Do not have access to encrypted user content
- Provide infrastructure services only
- Are contractually obligated to protect data confidentiality
6. Information Security
- End-to-end encryption (E2EE)
- Secure server infrastructure
- Strict internal access controls
7. Links to Other Websites
8. Changes to This Privacy Policy
9. Account Deactivation
- You will not be able to reactivate your account.
- You will no longer be able to log in.
- No one will be able to reuse your username (MXID), including you: this username will remain unavailable.
- You will leave all rooms and DMs that you are in.
- You will be removed from the identity server: your friends will no longer be able to find you with your email or phone number.
10. Effective Date
Contact Us
If you have any questions or concerns about this Privacy Policy, please contact us at: contact@2alo.org


