{"id":54192,"date":"2025-08-22T12:56:05","date_gmt":"2025-08-22T16:56:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54192"},"modified":"2025-08-22T12:56:05","modified_gmt":"2025-08-22T16:56:05","slug":"mesh-messengers","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/mesh-messengers\/54192\/","title":{"rendered":"Chatting offline: an overview of mesh messaging apps"},"content":{"rendered":"<p>Constant access to the internet and a cell service is taken as much for granted these days as electricity, and it\u2019s sometimes hard to imagine how we ever lived without them before. But what if you find yourself in a situation with no mobile internet or cell signal, but you need to stay in touch with friends nearby? For example, your group gets separated on a plane and you\u2019re seated in different sections, but you were all set to discuss your travel plans during the flight. Or you\u2019re at a music festival where the internet is wobbly and it\u2019s too loud to talk, but you still need to coordinate when to head to the main stage.<\/p>\n<p>This is where decentralized p2p (peer-to-peer), or mesh messaging apps can come in handy. These apps allow you to connect multiple devices into a single \u201cmesh\u201d network via Bluetooth or Wi-Fi Direct.<\/p>\n<p>In the 2010s, with the emergence of Wi-Fi Direct, apps like these made a lot of noise, but never really took off \u2014 it wasn\u2019t clear what they were for or where you\u2019d even use them. They were an odd substitute for walkie-talkies, but with a shorter range and higher power consumption, so they never became popular with smartphone users. Still, these types of messaging apps are alive and well today, with developers continuing to support them, and even building new ones.<\/p>\n<p>That\u2019s because they serve a key purpose: allowing folks to stay connected during natural disasters, coordinate search party efforts, or simply communicate with neighbors at home or at the summer cottage when there\u2019s no Wi-Fi or cell signal. For these and other similar situations, decentralized messaging apps that don\u2019t require an internet connection are a good, if not perfect, solution.<\/p>\n<p>So, if those walkie-talkies you ordered don\u2019t arrive before your planned hike, mesh messaging apps can step in as a backup.<\/p>\n<blockquote><p>The term \u201cdecentralized\u201d is also often used to describe blockchain messaging apps like <a href=\"https:\/\/status.app\/\" target=\"_blank\" rel=\"nofollow noopener\">Status<\/a> or <a href=\"https:\/\/brave.com\/talk\/\" target=\"_blank\" rel=\"nofollow noopener\">Brave Messenger<\/a>. However, we won\u2019t be talking about them today since they require a stable internet connection to work.<\/p><\/blockquote>\n<h2>How p2p messaging apps work<\/h2>\n<p>These apps work on a decentralized <strong>mesh network<\/strong>, where each device serves as both a client and a relay. A distributed network is built up from many client devices, and each member can act as a bridge to pass messages along.<\/p>\n<p>Imagine your smartphone turning into a mini walkie-talkie that can send messages to other nearby devices that have the right app installed. If you want to send a message, it\u2019ll hop from one user\u2019s smartphone to another\u2019s until it reaches the intended recipient. And the devices it passes through can\u2019t read the message as it\u2019s encrypted for connecting nodes.<\/p>\n<p>Devices connect directly with each other via either Bluetooth or Wi-Fi Direct.<\/p>\n<h2>Which mesh messaging apps are worth trying?<\/h2>\n<p><a href=\"https:\/\/bitchat.free\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>BitChat<\/strong><\/a>. This is the latest decentralized messaging app based on Bluetooth Low Energy (BLE), launched in July 2025 by ex-Twitter (now X) co-founder Jack Dorsey. The app is positioned as a modern, encrypted version of the IRC chats from the late 1990s \u2014 and it looks like one too.<\/p>\n<p>It claims to be completely decentralized with no servers and to use end-to-end encryption; messages are broken into 500-byte fragments for smoother transmission. The app requires no sign-up, email, or phone number.<\/p>\n<p>However, security researchers have <a href=\"https:\/\/www.supernetworks.org\/pages\/blog\/agentic-insecurity-vibes-on-bitchat\" target=\"_blank\" rel=\"nofollow noopener\">already found<\/a> critical vulnerabilities in BitChat, and even call it a victim of \u201cvibe coding\u201d \u2014 an AI-driven development technique that omits a proper security audit. Currently, AI-powered tools still <a href=\"https:\/\/cyberscoop.com\/vibe-coding-ai-cybersecurity-llm\/\" target=\"_blank\" rel=\"nofollow noopener\">struggle<\/a> with \u201csecure by design\u201d, meaning they have difficulty integrating fundamental security principles at the app\u2019s design phase. Jack Dorsey promises to fix the bugs in upcoming updates.<\/p>\n<p>You can install the messenger from both the <a href=\"https:\/\/apps.apple.com\/us\/app\/bitchat-mesh\/id6748219622\" target=\"_blank\" rel=\"nofollow noopener\">App Store<\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.bitchat.droid\" target=\"_blank\" rel=\"nofollow noopener\">Google Play<\/a>. The source code is <a href=\"https:\/\/github.com\/permissionlesstech\" target=\"_blank\" rel=\"nofollow noopener\">available on GitHub<\/a>, and you can follow the official releases and updates on <a href=\"https:\/\/x.com\/jack\" target=\"_blank\" rel=\"nofollow noopener\">Jack Dorsey\u2019s X account<\/a>.<\/p>\n<p><a href=\"https:\/\/bridgefy.me\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Bridgefy<\/strong><\/a>. This has over 12 million users, which is a lot for a mesh messaging app \u2014 the more users there are, the more likely you\u2019ll be able to connect.<\/p>\n<p>Bridgefy also uses BLE, works on both iOS and Android, supports end-to-end encryption, and has two modes: private messaging and public broadcasting. On the downside, the free version is plagued with obtrusive ads, and performance can be patchy.<\/p>\n<p><a href=\"https:\/\/briarproject.org\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Briar<\/strong><\/a>. This is an open-source, end-to-end encrypted messaging app whose code has passed an <a href=\"https:\/\/briarproject.org\/raw\/BRP-01-report.pdf\" target=\"_blank\" rel=\"nofollow noopener\">independent security audit<\/a> by Germany\u2019s Cure53.<\/p>\n<p>In addition to working via Bluetooth and Wi-Fi Direct, it can also connect over the internet through the Tor network, which makes it a more versatile tool.<\/p>\n<p>While Briar provides the highest level of privacy and security, there are trade-offs. First, you can only add a contact in person by scanning a QR code or by using special links shared through other channels. Second, forget about voice messages, files, or GIFs \u2014 Briar only supports text messaging.<\/p>\n<p>Finally, Briar is only available for Android.<\/p>\n<p><a href=\"https:\/\/meshmeapp.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>White Mouse<\/strong><\/a>. A relatively new project, White Mouse is a chat app with disappearing messages. It\u2019s currently only available for Android, but the developers have promised versions for iOS, macOS, and Windows. It doesn\u2019t require a phone number to sign up, provides end-to-end encryption, doesn\u2019t store messages anywhere, and can automatically delete them. To increase privacy, White Mouse doesn\u2019t allow users to forward messages, take screenshots, or record the screen. It also creates special backgrounds with watermarks to prevent chats from being photographed. It can work both over the internet and directly between nearby devices.<\/p>\n<h2>What to bear in mind when using mesh messaging apps<\/h2>\n<ul>\n<li>They aren\u2019t a replacement for centralized messaging apps. Even in an urban environment, sending a message to a friend in the next building over can be a challenge.<\/li>\n<li>The range is limited by Bluetooth\/Wi-Fi power. At least one other user with the same messaging app must be within 100 meters of you in an open area \u2014 even closer if there\u2019s no direct line of sight.<\/li>\n<li>Performance depends on the number of users \u2014 the more people using the app, the further a message can travel. A mesh network with enough users can stretch for miles. This means you may have to play the diplomat and convince all your friends to switch from their more user-friendly chat apps.<\/li>\n<li>Your battery will drain faster with active Bluetooth \/ Wi-Fi Direct use, so stock up on power banks.<\/li>\n<li>Not all mesh messaging apps use reliable encryption. Claiming to have it and actually having it aren\u2019t the same thing, so only trust independent researchers and their verification.<\/li>\n<li>Favor open-source projects, as these allow a wide range of researchers to verify app security.<\/li>\n<li>Some apps may have vulnerabilities, as the example with BitChat showed. Therefore, it\u2019s not recommended to discuss anything confidential in these apps. And use <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> on your devices to prevent your data from being compromised and to defend against malicious actors.<\/li>\n<\/ul>\n<h2>General tips for using mesh messaging apps<\/h2>\n<p>Mesh messaging apps aren\u2019t a replacement for regular messaging apps for daily communication. They\u2019re a tool for special circumstances and should be treated like a first-aid kit, a fire extinguisher, or a life jacket \u2014 have one on hand and be glad you normally don\u2019t have to use it.<\/p>\n<ul>\n<li>Install and set up the app in advance \u2014 at the critical moment, you may not have time to figure things out or be able to install the app.<\/li>\n<li>Make sure your contacts, neighbors, or travel buddies have the same app installed.<\/li>\n<li>Install several different mesh messaging apps if your lifestyle involves frequent travel or being in places with potential connectivity issues \u2014 you never know which one will find a \u201cpartner\u201d nearby.<\/li>\n<li>Before an important event, test the app under conditions similar to what you expect to encounter.<\/li>\n<li>Have a backup communication plan, such as actual walkie-talkies suited for the specific terrain.<\/li>\n<\/ul>\n<blockquote><p>What else to read about messaging app security?<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/what-makes-a-messenger-secure\/48671\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>What makes a messaging app secure?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/messengers-101-safety-and-privacy-advice\/53300\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Messengers 101: safety and privacy advice<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-host-private-videoconferences\/49045\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>How to host private videoconferences<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing\/53012\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>WhatsApp and Telegram account hijacking: How to protect yourself against scams<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-interop-other-messengers-risks\/51029\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Messaging other platforms via WhatsApp: the pros and cons<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.<\/p>\n","protected":false},"author":2775,"featured_media":54194,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,9],"tags":[105,1304,1250,607,43,97,663],"class_list":{"0":"post-54192","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-android","10":"tag-communications","11":"tag-ios","12":"tag-messengers","13":"tag-privacy","14":"tag-security-2","15":"tag-travel"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mesh-messengers\/54192\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mesh-messengers\/29473\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mesh-messengers\/24582\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mesh-messengers\/12781\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mesh-messengers\/29414\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mesh-messengers\/28497\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mesh-messengers\/30048\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mesh-messengers\/40338\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mesh-messengers\/13730\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mesh-messengers\/23124\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mesh-messengers\/32613\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mesh-messengers\/29602\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mesh-messengers\/35345\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mesh-messengers\/34976\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/messengers\/","name":"messengers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2775"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54192"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54192\/revisions"}],"predecessor-version":[{"id":54197,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54192\/revisions\/54197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54194"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}