Polynom Community Edition is designed for individuals, small groups, and communities wanting to control their data. Self-host your content, secure your communications, and protect your privacy.
*Terms apply, read more
Purpose-built for companies that need security and compliance solutions, the Polynom Enterprise platform offers a variety of features to meet the needs of businesses of all sizes.
Cryptographically derived avatars, uniquely generated from your keypair. The use of cryptographically derived avatars provides an additional layer of security for Polynom users. By analyzing the hash and identifier of a Graphatar, it is possible to verify the authenticity of a user's identity and to detect potential threats.
» Learn More
SE is a "rolling cipher" algorithm, meaning that each entropy line is derived from a separate source and is compounded into the final result, an AES-256 shared key. This final AES-256-bit key is used for E2EE, encrypting all content between parties using AES-256-bit GCM mode. SE keys are identified across the network using a SHA-512 hash derived from an HMAC (hash-based message authentication code). This hash allows parties involved to know which SE key to use for the decryption of content without revealing any of the entropic data and other secrets used to derive the SE keys.
For example, Alice asks Bob if he still has that picture they took last year on holiday. Bob says he does. Then Alice asks if Bob remembers the name of her favorite restaurant. Fortunately for Bob, he does. They both add these items they have/know to Polynom's Social Encryption engine and now they can share fully encrypted messages unique to them alone.
» Learn More
Social Encryption™ ("SE") is a quantum-resistant technology that allows 1:n people to communicate with end-to-end encryption (E2EE) across a network without manually exchanging keys. It does this by replacing network key exchanges with a symmetric key exchange from already known sources of entropy that can be acquired from anything, including passphrases, contents of files/images, or any offline/online source of data. By using shared experiences and knowledge, there is no need to perform traditional network handshakes to exchange shared keys. This symmetric key exchange leaves no network trace, i.e., the network does not know that any data has been exchanged when multiple parties communicate securely in an E2EE fashion.
» Learn More
Quantum Rooms™ are rooms only for individuals who share a common SE key. Just like the principles of Quantum Entanglement, the content within Quantum Rooms only exists as long as 1:n individuals view it. For this reason, Quantum Rooms are both temporal and ephemeral. The moment the last user leaves the Quantum Room, the content is permanently deleted, and the room ceases to exist. Quantum Rooms merge disappearing content and private rooms without manually inviting users and managing authorization.
» Learn More
Announcement Rooms are phishing resistant rooms that allow only whitelisted users and/or roles to broadcast messages. In the future, we have plans to integrate multi-sig messages and other verification methods to ensure users can validate any and all messages, even from devices that may have been compromised.
» Learn More
Hybrid rooms allow users to merge different room types into one. For example, merging a text and voip room into one consolidated interface. Current functionality will support only text and voip to be merged, but in the future, Polynom will support merging any room types. You can create announcement + file rooms, poll + call rooms, blog + paywall landing pages, and more.
» Learn More
Hiding-in-Plain Sight™ technology allows Polynom to operate securely (i.e., equivalent to a Type 1 Cryptographic device) on compromised networks, servers, and/or in hostile countries. Polynom achieves this by using various techniques to disguise its traffic and make it difficult to block or intercept. In addition to the techniques described above, Polynom uses various other techniques to protect its traffic, including PQC CRYSTALS Kyber-1024 exchanges resulting in AES 256-bit keys. These techniques make Polynom one of the most secure communications platforms available.
» Learn More
Polynom uses the very latest and strongest encryption recommended by NIST and the US NSA's Commercial National Security Algorithm (CNSA) Suite.
For further information, see: The Commercial National Security Algorithm Suite 2.0 FAQ.
Polynom deploys:
CRYSTALS-Dilithium (NIST Level V) (CNSA2.0)
CRYSTALS-Kyber (NIST Level V) (CNSA2.0)
Secure Hash Algorithm SHA512 (CNSA2.0)
AES 256 GCM (CNSA2.0)
Leighton-Micali Signature (LMS) (CNSA2.0)
ED25519 ECDSA (CNSA1.0)
X25519 ECDH (CNSA1.0)
» Learn More
Windows 10+ compatible
Android 9+ compatible
Debian 12+ compatible
iOS 12+ compatible
macOS 14+ compatible