Help
Quick answers to the most frequently asked questions.
Someone wants to talk to you privately through Solo2. The link you have received is a personal invitation to create an encrypted communication channel between the two of you. No one else can read what you say to each other — not even us.
- Open the link in your browser (Chrome, Safari, Firefox — any will do)
- Create your account: choose a username (it can be made up) and a password
- The connection with the person who invited you will be established automatically
You don't need to download anything from any store. You don't need to give your phone number or your email. You don't need to pay anything — the first 7 days are free. Everything you write travels directly from one device to the other, without passing through any server.
Solo2 works directly in the browser, without downloading anything from any store. But if you want to receive notifications (nudges) or have it as an app on your home screen, you need to install it. It only takes a minute.
Important on iPhone
On iPhone, install Solo2 on your home screen BEFORE creating your account. If you create your account from Safari first, your vault will remain inside Safari, separate from the installed app. Notifications will not work from the browser either. This is standard iOS behaviour to protect browser security, not a limitation of Solo2.
On iPhone (Safari):
- Open solo2.net in Safari
- Tap the share button (square with an upward arrow)
- Tap “Add to Home Screen”
- Open Solo2 from the new icon
- Now create your account from the installed app
On Android:
The browser directly offers you “Install app” the first time you visit Solo2. On Android, the browser and the installed app share the same space and all your data. Installing is optional, but recommended for the icon and notifications.
On a computer:
No installation needed. Solo2 works directly in the browser. Notifications work in all desktop browsers.
Your vault lives inside a single browser
Solo2 stores all your data — messages, files, contacts — in an encrypted vault inside the browser where you created your account. If you use Chrome, your vault is in Chrome. If you open Firefox on the same computer, it will be a different, empty vault. It’s like a safe built into a wall: if you move house, the safe stays in the old house. That’s why it’s important to choose where you create your account and not switch browsers afterwards.
- One person opens Solo2 and taps Share (their QR code appears) (se muestra su código QR)
- The other person opens Solo2 and taps Scan
- Point the camera at the QR code → a beep sounds → done! The request is sent automatically
- The first person accepts the request and the tunnel is created
Option A — Send a link:
- Open Solo2 and tap Share
- Send the link by any means (email, messaging, SMS...)
- The other person opens the link, signs into Solo2 and accepts the connection
Option B — Send a screenshot of the QR:
- Open Solo2 and tap Share (your QR appears) (se muestra tu QR)
- Take a screenshot and send it by any means
- The other person opens Solo2, taps Scan, then "Load QR from image", y luego "Cargar QR desde imagen"
- Select the screenshot → the connection is established automatically
Can you drag a QR image? (desktop only)
Yes. With the scanner open, drag an image containing a QR code from any folder or application and drop it onto the camera area. Solo2 will detect the QR automatically.
You start with a free trial period. All features, no limits, no card required. After that, the service costs 10 cents a day — only the days you have it active. You can pause and reactivate whenever you want.
If your balance reaches zero, you can still log into Solo2 and access your vault. But you won’t be able to communicate until you top up.
If you run out of balance, you have 90 days of grace period. If after those 90 days you haven't topped up, your registration is deleted from the server. But your local data — your vault with messages, files and contacts — stays on your device. It's yours forever.
If you keep your cryptographic identity (your 24 recovery words or the equivalent QR code), you can access your vault at any time, even without an active account.
Yes. Solo2 is direct communication, like a phone call. Messages go from your device to the other person’s device without passing through any server. For this to work, you both need to be connected at the same time.
If your contact is not connected, the message waits on your device. When you’re both connected, it’s delivered instantly.
You can send them a nudge — a notification that lets them know you want to talk. When they connect, you’ll be able to communicate.
Think of it like a phone call: if the other person doesn't answer, it's not that the phone is broken — they're just not available. With Solo2 it's the same. And the advantage is that when you finally connect, the conversation is absolutely private. Nobody listens. Nobody records. Nobody knows it existed.
Your data lives on your device, not on our server. If you lose your only device and have no backup, the messages are lost. That’s not a bug: it’s security. They’re your data, on your devices, not on ours.
Protect yourself: use two devices
When you’re connected on two devices at the same time, Solo2 automatically syncs the contents of your vaults. If you lose one, the other has your copy. You don’t have to do anything — syncing is automatic as long as both are active.
Make backups
In addition to using two devices, you can export a copy of your cryptographic identity and your complete vault to any external medium that you own and fully control. Be careful with the passwords for those backups: they are the key to your identity.
Your cryptographic identity (your 24 words or the equivalent QR code) allows you to recover your identity from any device. Write them down on paper and keep them in a safe place.
Solo2 doesn't let your operating system's keychain (Apple Keychain, Google Password Manager) store your credentials. It's not a bug — it's a principled decision.
Solo2 promises that no trace of your activity remains outside your control. Credentials stored in an external keychain are accessible by your operating system's manufacturer, and by anyone with access to your device and your fingerprint or Face ID.
Your username and password only exist in your memory and on your device — if you choose so.
Maximum Security
In Settings you'll find the Maximum Security toggle. When enabled, Solo2 asks for your password every time you open the app — the session closes automatically. When disabled, Solo2 remembers your session on the device and you get in directly.
Do you share your device with other people? Keep Maximum Security enabled. Are you the only one who uses your phone? Disable it to get in with a single tap.
No. Not even we can do that. Solo2 has no mechanism to revoke your access remotely — and that's a deliberate decision.
Your data is yours. Your 24 recovery words give you access to your vault at all times, regardless of whether the server exists or is running. Nobody — not a judge, not an administrator, not us — can take that key away from you.
What happens if I lose my phone?
Your device's protection is the PIN, fingerprint or Face ID that you set up. Solo2 doesn't add a remote "emergency button" because that would mean someone — even if it were us — could decide who accesses your data and who doesn't. If someone else has access to your unlocked phone, the problem predates any application.
If you have your 24 words or the equivalent QR, you can restore your identity on any new device. But identity is not the same as data: when you sign in on a new device, you are you, but your vault is empty. Your data only exists inside the vaults of the devices where you had it. The only way to get it back is to have two devices active at the same time — they detect each other and sync all the information — or through the backups you've made.
Solo2 is a web application. It's not downloaded from any store. That means neither Apple nor Google know you use it. There's no record in your purchase history, in your Apple or Google account, or on any external server.
If you install Solo2 on your home screen
An icon appears on your home screen, just like any other app. But the difference is that this icon isn't linked to any Apple or Google account. If you delete Solo2 from your device, everything disappears: the icon, the browser data, and your local vault. Nothing remains.
If it were a store app
Any app downloaded from the App Store or Google Play is permanently recorded in your purchase history, even if you delete it afterwards. Apple or Google know you installed it, when, and on which device. Anyone with access to your family account can see it.
The only person who can know you use Solo2 is someone holding your phone and seeing the icon. There is no centralised record anywhere. It's as simple as that.
No. Nobody can. Not us, not your internet provider, not any government. It's not a promise — it's a technical impossibility.
Your messages are encrypted on your device with keys that only exist on the participants' devices. Solo2's server does not participate in the conversation and stores nothing. Even if someone intercepts the traffic, they would only see encrypted data impossible to decipher.
The only person who can read your messages is the person you're talking to. It's as simple as that.
Yes, it's true. You only need a username of your choice. We don't ask for a phone number, email, real name, or ID document.
There is nothing in your Solo2 account that can link it to your real identity. We don't even know who you are. Your identity in Solo2 is purely cryptographic — a pair of mathematical keys that your device generates when you create your account.
No. Solo2 is not downloaded from any app store, so it doesn't appear in your Apple or Google purchase history. Nobody reviewing your family account can see that you use it.
Payments are processed by MenzuriPay, a system completely separate from Solo2. Your bank statement will show a charge from MenzuriPay, not Solo2. And within Solo2, no payment history or banking details are stored — only your current balance.
Solo2's server only knows your username and a hash of your password. It doesn't know who you talk to or how many tunnels you have — that information only exists inside your vault, encrypted on your device.
When your app wants to connect with someone, it leaves a note on the server requesting contact. Your contact, who periodically checks if anyone wants to talk, finds your note and gets your address. From that point on, the two devices talk directly to each other. The server no longer participates.
Everything that passes through the server lives in temporary memory for milliseconds and is erased immediately. Nothing is written to disk. The server doesn't know if the connection was established, how long it lasted, or how many messages were exchanged. If the server shut down, the two users would keep talking.
The conversation is secure before it even starts: when the tunnel is created, the devices exchange cryptographic keys. Each message is encrypted with the recipient's key. Only they can decrypt it. Nobody else has those keys — not even the server.
In the most widespread messaging today, messages travel through the servers of the company that provides the service — even when they are encrypted. Not in Solo2. What you write travels directly from the writer's device to the reader's device. That difference is architectural, not cosmetic: what never passes through our servers we cannot give to a third party. For most people and most common threats — a compromised service, a court order on the company, a massive vendor breach — that first layer is enough.
Still, we encrypt. There are scenarios where architecture alone is not enough: a program residing on your own device monitoring outgoing traffic, networks under surveillance by actors with many resources, pattern analysis on an industrial scale. For those scenarios — the journalist with a source, the lawyer with a sensitive case, the doctor with patient data, a negotiation under a confidentiality agreement — Solo2 encrypts two things: the content of the message and the sending data. Each message is encrypted with a unique key that is destroyed as soon as it is used, and the keys that encrypt the sending data are also periodically renewed.
Solo2 protects you in two layers: first by where your messages do not go, then by how the few bytes that do leave the device travel. For most people, the first coat is enough. For those who send what matters especially – sensitive documents, conversations with a patient, open cases, proposals with confidentiality clauses – the second exists and works in silence.
Install Solo2 on both devices and sign in with the same user. When both are connected at the same time, synchronization is automatic. You don't have to do anything.
Solo2 syncs everything: messages, files, contacts, settings. What you have on one device appears on the other. If you add a contact on your phone, it appears on the computer. If you change the visual theme on the computer, it changes on the phone. All in real time, while both are active.
Synchronization is direct between your devices — it doesn't go through any server. Your data travels encrypted from one to the other exactly like a conversation with another person.
One detail: some browsers may pause inactive tabs to save battery. If you use your computer as a permanent node, it's a good idea to pin the Solo2 tab or disable automatic tab suspension in your browser settings.
Use two devices. That's the best protection. When your phone and computer are connected to Solo2 at the same time, your entire vault syncs automatically between them. If you lose one, the other has your complete copy.
Your home or office computer can act as a permanent node. If you leave Solo2 open in a browser tab, your computer receives and stores everything sent to you, even when your phone is off or has no signal. When the phone reconnects, it syncs automatically.
It's like having your own private server — but without giving up any privacy guarantees. Everything stays encrypted, everything stays direct between your devices, and nobody else has access to your data.
Keep in mind that synchronization is bidirectional: if you delete something on one device, it disappears on the other. This can be an advantage — if your phone is stolen, you can make a backup from your computer and then launch a total wipe that will propagate to the stolen phone.
For maximum security, combine synchronization with periodic backups of your vault from the Solo2 menu. Synchronization protects you day to day. The backup protects you against extreme situations.