Text messages
Messages are intended to be encrypted on the client before sending. The server should not see message plaintext.
Security model
Hestia is designed as a privacy-first messenger focused on reducing server-side data exposure. In the current architecture, messages and files are intended to be encrypted on the client before they touch the server.
01
Messages are intended to be encrypted on the client before sending. The server should not see message plaintext.
Files are intended to be encrypted before upload. The server should store encrypted blobs, not plaintext files.
Calls use WebRTC media transport. WebRTC uses DTLS-SRTP for media encryption in transit.
Message history is stored on the user's device instead of being centrally stored as plaintext on the server.
02
Hestia reduces plaintext exposure, but it does not make metadata disappear. In the current architecture, a server operator may be able to observe operational metadata.
03
Each user is intended to have a public key. First contact follows a trust-on-first-use model: the first observed key is trusted until it changes or the user verifies it out of band.
04
Hestia cannot protect everything. Some risks are outside the messenger protocol and depend on the user's device, behavior, and environment.
05
Messages and files are stored locally for usability. Decrypted data exists on the device while the user reads messages, opens files, or participates in calls.
06
Push notifications are intended to act as a wake-up mechanism. By default, push payloads should avoid plaintext message content and carry only minimal metadata required to notify the client.
07
The server relays encrypted traffic, coordinates delivery, and may temporarily store encrypted payloads for offline delivery. It is not intended to be the plaintext source of conversation history.
The server is controlled by its operator. In a self-hosted model, that operator may be you, your organization, or a community admin.
08
Running your own server increases infrastructure control. It can reduce reliance on a third-party service operator, but it does not hide metadata from the server you operate.
09
10
11
Possible future work includes stronger key verification UX, optional at-rest encryption controls, additional metadata minimization, and more transport privacy options.