Privacy Engineering
Privacy between two.
No exceptions.
A communication tunnel where only two people exist. Architecture designed to make interception technically impossible.
Create private tunnelZero-Trust Architecture
Not even we can access your communications.
It's not a privacy policy. It's a deliberate technical limitation.
End-to-end encryption
Your master key is generated with 256 bits of real entropy — the same level as Bitcoin. Each message is encrypted with a unique key that is destroyed afterwards. Your password protects access. Your 24 words protect your data.
Direct P2P connection
When possible, data goes directly between devices. The server only handles the initial introduction.
No storage, no metadata
Messages are not stored on any server. We also do not store who you talk to, when, or how often. No content, no metadata, no trace.
Impossible to hand over
If someone requests your data, we have nothing to hand over. It's not that we don't want to. We simply can't.
5 layers of security
Your password connects you to the service. Your 24 words protect your identity. Your device secret protects your vault. And each message uses a key that is destroyed afterwards.
Two factors without complications
Your account is protected by something you know (your password) and something you have (your device). No authenticator apps, no SMS, no USB keys. The second factor is invisible — your device generates it automatically.
Use cases
Designed for relationships that demand confidentiality
Each Solo2 tunnel is exclusive between two people. No groups. No leaks. No exceptions.
Lawyer — Client
Professional privilege requires infrastructure to guarantee it. Privileged communication with the technical certainty that no one else can access it.
Compliant with GDPR confidentiality and professional privilege requirements.
Doctor — Patient
Health data with the level of protection it deserves. Consultations, follow-ups and sensitive communication without intermediaries.
Designed to comply with health data regulations.
Parents — Children
A private digital space between parent and child. Where they can talk without anyone else — not even the platform — seeing the conversation.
The digital refuge your family deserves.
Partners — Confidential
Negotiations, strategies and decisions that must stay between two people. No risk of leaks or unauthorized access.
Protection of trade secrets and intellectual property.
Couples
The intimacy of a relationship shouldn't pass through third-party servers. An exclusive tunnel where only the two of you exist.
Technical transparency
How we protect your communication
Two connection modes, both with end-to-end encryption. You always know which mode you are in: the app tells you in real time.
Communication without witnesses
When both devices can connect directly, data travels from your device to your contact's without passing through any intermediate server.
Your device → Internet → Their device
✓ The server sees nothing
The blind mirror
When a direct connection is not possible (mobile networks, firewalls), data is relayed through our server. But it travels encrypted: the server relays packets it cannot decrypt, like a mirror that transmits without being able to see what it transmits.
Your device → [Mirror] → Their device
✓ E2E encrypted: the mirror cannot read
In both cases, encryption keys only exist on the participants' devices. Neither Solo2 nor anyone can decrypt the communication.
Process
Three steps to total privacy
Create your account
Choose a username. Solo2 generates your master key and your 24 security words. Your key is encrypted with your password before leaving your device.
Invite your contact
Generate a unique code that only works once.
Connection established
Private tunnel active. We disappear from the equation.
Frequently asked questions
Total transparency
What data does Solo2 store?
→ A username and a public name (both can be made up), a hash of your password, and your master key encrypted with your password — an opaque blob our server stores but cannot read. No email. No phone. Zero stored messages. When you close the tab, your sensitive data vanishes from memory.
Can Solo2 read my messages?
→ No. Technically impossible. Your master key is randomly generated on your device and never leaves it. Each message is encrypted with a unique key that is immediately destroyed. And we really don't even know who you are.
What happens if authorities request data?
→ We only have a username, which can be made up. The content of your communications does not exist in our systems.
Do you have access to my card details?
→ No. European PCI-DSS gateway. We never see or store your banking details. Furthermore, our billing records are not linked to any user account — they are anonymous cash tickets. We cannot know who paid for what.
Who is behind Solo2?
→ Menzuri Gestión SL, Lugo, Spain. European GDPR. We're not an opaque multinational. We're here and we're going to stay here.
How secure is my password?
→ Your password protects access to the service. But the real security lies in your 24 words: a master key of 256 bits generated randomly — the same level as Bitcoin, but with an extra layer: you also need your physical device. Your original password never reaches our servers.
What happens if I lose my device?
→ Your identity is protected by two independent keys: your password (to connect to the server) and your 24 words (your real master key). With either one you can recover your identity. But your data — messages, files, contacts — lives only on your devices. If you lose your only device, the data is lost. That's not a bug: it's security taken to the extreme. It's your data, on your devices, not on our servers.
Can I protect myself against data loss?
→ Yes. Use Solo2 on more than one device. When both are connected at the same time, they automatically sync their vaults. If you lose one, the other has the copy. You can also export an encrypted backup of your identity.
What happens if your server disappears?
→ Your data survives. With your 24 words you can access your local vault without a server. Your data is yours, on your devices. Even if we disappear, you still have access to your data.
Solo2 is not a product. It's a reaction.
A response to a world where intrusive governments and tech multinationals have made private communication impossible.
A breath of freedom from those who have turned your data into their business.
"For some it is a vital necessity. For others, an act of digital sovereignty."
Digital sovereignty
Your data is yours. For real.
Your master key has 256 bits of real entropy — exactly the same security that protects Bitcoin wallets.
But Solo2 goes one step further: even if someone steals your 24 words, they also need your physical device para acceder a tu bóveda. En Bitcoin, con las 24 palabras se accede a todo. En Solo2, no.
Your data lives on your devices. Your 24 words are in your possession. You don't need our server to access your information.
Even if we disappear, you still have access to your data. Porque son tuyos. Son tus dispositivos. Son tus 24 palabras. No son nuestros datos ni nuestros dispositivos.
No risks. No surprises.
10-day free trial
All features, no limits and no credit card.
Prepaid balance, billed monthly in arrears
You add credit whenever you want. Only actual usage is deducted at the end of each month. If the service were unavailable on any given day, that day is not counted.
Anonymous payments by design
Your payments are not linked to your account — they are anonymous tickets. This protects your identity, but it also means we cannot process refunds: we do not know who paid.
No commitment
Cancel whenever you want, with no penalties.
Real privacy.
Not marketing promises.
A tunnel where mathematically only two people can exist.
Create private tunnel