Recent from talks
Nothing was collected or created yet.
Threema
View on Wikipedia
| Threema | |
|---|---|
App icon | |
| Developer | Threema GmbH |
| Initial release | December 2012[1] |
| Stable release(s) | |
| Written in | Objective-C (iOS), Java (Android), C, .NET (Windows Phone) |
| Operating system | iOS, Android, Windows Phone |
| Available in | English, German, French, Spanish, Italian, Russian, Brazilian Portuguese, Polish, Rumantsch Grischun |
| Type | Encrypted instant messaging & voice calling |
| License | Android client: AGPL-3.0-only iOS client: AGPL-3.0-only Web client: AGPL-3.0-or-later[5] Protocol: MIT[6] Server: Proprietary |
| Website | threema |
Threema is a paid cross-platform encrypted instant messaging app developed by Threema GmbH in Switzerland and launched in 2012. Users can make voice and video calls, send photos, files, and voice notes, share locations, and join groups. The service offers end-to-end encryption. Unlike many other popular secure messaging apps, Threema does not require phone numbers or email addresses for registration, only a one-time purchase that can be paid via an app store or anonymously with Bitcoin or cash.[7]
Threema is available on Android and iOS, and has clients for HarmonyOS, Linux, macOS Windows and can be accessed via web browser, but requires a mobile app to function.[8]
Features
[edit]The service claims to be based on the privacy by design principles by not requiring a phone number or other personally identifiable information. This helps anonymize the users to a degree.[9][10]
Threema uses a randomly generated user ID, created after the initial app launch, instead of requiring a linked email address or phone number to send messages. It is possible to find other users by phone number or email address, if the user allows the app to synchronize their address book.[11]
Linking a phone number or email address to a Threema ID is optional. Hence, the service can be used anonymously.
Users can verify the identity of their Threema contacts by scanning their QR code when they meet in person. The QR code contains the public key of the user, which is cryptographically tied to the ID and will not change during the lifetime of the identity.
Using this strong authentication feature, users can make sure they have the correct public key from their chat partners, which provides additional security against a man-in-the-middle attack.
Threema classifies contacts according to three verification trust levels. The verification level of each contact is displayed in the Threema application as dots next to the corresponding contact.
In addition to text messaging, users can make voice and video calls, share locations, voice messages, and send media or other files.[12] A web app, Threema Web, can be used on desktop devices, but only as long as the phone with the Threema installation of the user is online. There is a beta for iOS users, which allows for the phone to be offline while using a desktop app.
In addition to one-to-one chats, Threema offers group chats with up to 256 people. Files are limited to 50MB per file.[12][13] It is also possible to create polls in personal or group chats.[14]
To emulate the 'Saved Messages' feature available in other messengers, one can created a group with only oneself as a member. For licensing and privacy reasons, Threema does not include a GIF library natively, but it is compatible with GIF keyboards and plays animations seamlessly in the chat.
Software
[edit]Threema is developed by the Swiss company Threema GmbH.[15] The servers are in Switzerland and the development is based in Pfäffikon SZ. As of May 2021, Threema had 10 million users[16] and the business version, Threema Work, was used by 2 million users across 5,000 companies and organizations.[17]
At the end of July, 2021 Threema introduced the ability for companies to host the messenger on their own server, primarily intended for companies with significantly high privacy concerns.[18]
Clients
[edit]With Threema Web, a client for web browsers, Threema can be used from other devices like desktop computers, though only as long as the original device is online.
Threema optionally supports Android Wear smartwatch and Android Auto.[19] Threema launched support for end-to-end encrypted video calls on August 10, 2020. The calls are person-to-person with group calls unavailable.[20]
The application does not allow the self-deletion of messages after a period defined by the interlocutors. The application does prevent screenshots in conversations when configured to do so.
Architecture
[edit]The entire communication via Threema is end-to-end encrypted. During the initial setup, the application generates a key pair and sends the public key to the server while keeping the private key on the user's device.[21] The application then encrypts all messages and files that are sent to other Threema users with their respective public keys.[9][22] Once a message is delivered successfully, it is immediately deleted from the servers.[23]
The encryption process used by Threema is based on the open-source library NaCl library. Threema uses asymmetric ECC-based encryption, with 256-bit strength. Threema offers a "Validation Logging" feature that makes it possible to confirm that messages are end-to-end encrypted using the NaCl Networking and Cryptography library.[24]
In August 2015, Threema was subjected to an external security audit.[25] Researchers from cnlab confirmed that Threema allows secure end-to-end encryption, and claimed that they were unable to identify any weaknesses in the implementation.
Cnlab researchers also confirmed that Threema provides anonymity to its users and handles contacts and other user data as advertised.[26][27]
History
[edit]Threema was founded in December 2012 by Manuel Kasper.[28] The company was initially called Kasper Systems GmbH.[29] Martin Blatter and Silvan Engeler joined Kasper to develop an Android application that was released in early 2013.[30]
In Summer 2013, the Snowden leaks helped create an interest in Threema, boosting the user numbers to the hundreds of thousands.[31] When Facebook took over WhatsApp in February 2014, Threema got 200,000 new users, doubling its userbase in 24 hours.[32] Around 80% percent of those new users came from Germany. By March 2014 Threema had 1.2 million users.[30]
In Spring 2014, operations were transferred to the newly created Threema GmbH.[29][33] Martin Blatter took over the position of CEO.[34]
In December 2014, Apple listed Threema as the most-sold app of 2014 at the German App Store.[35]
In 2020, Threema expanded with video calls,[20] plans to open-source its client-side apps and introduce reproducible builds of them,[36] as well as introduce Threema Education, a variation of Threema intended for education institutions.
In September 2020, Threema was acquired by AFINUM, a German private equity firm based in Munich.[37]
During the second week of 2021, Threema saw a quadrupling of daily downloads spurred on by controversial privacy changes in the WhatsApp messaging service. A spokesperson for the company also confirmed that Threema had risen to the top of the charts for paid applications in Germany, Switzerland, and Austria.[38] This trend continued into the third week of the year, with the head of Marketing & Sales confirming that downloads had increased to ten times the regular amount, leading to "hundreds of thousands of new users each day".[39]
In October 2022, researchers from ETH Zurich reported multiple vulnerabilities affecting Threema's security against network, server and client-based attacks. A new release fixing these issues was released in November 2022 and the vulnerabilities were announced publicly in January 2023.[40]
In September 2024, CEO Martin Blatter and the remaining founders and original developers left the company and Robin Simon, a former executive from TX Group became CEO.[41][42]
Related products
[edit]Threema Work
[edit]On May 25, 2016, Threema Work, a corporate version of Threema, was released. Threema Work offers extended administration and deployment capabilities.[43] Threema Work is based on a yearly subscription model.[44]
Threema Gateway
[edit]On March 20, 2015, Threema released a gateway for companies. Similar to an SMS gateway, businesses can use it to send messages to their users who have Threema installed.[45] The code for the Threema Gateway SDK is open for developers and available on GitHub.[46]
Threema Broadcast
[edit]On August 9, 2018, Threema released Threema Broadcast, a tool for top-down communication. Similar to emails in electronic newsletters, Threema messages can be sent to any number of feed subscribers, and the Threema Broadcast allows to create chatbots.
Threema Education
[edit]On September 10, 2020, Threema released Threema Education, a version of its messenger designed for education institutions. The app integrates Threema Broadcast and requires a one-time payment for each device used. It's intended for use by teachers, students, and parents.[47]
Threema OnPrem
[edit]On July 27, 2021, Threema released Threema OnPrem, a version of the messenger which could be hosted on a company's own servers for maximum security purposes.[48]
Privacy
[edit]Since Threema's servers are in Switzerland, they are subject to the Swiss federal law on data protection. The data center is ISO/IEC 27001-certified.[49]
Linking a phone number and/or email address to a Threema ID is optional; when doing so, only checksum values (SHA-256 HMAC with a static key) of the email address and/or phone number are sent to the server.[50]
Due to the small number of possible digit combinations of a telephone number, the phone number associated with a checksum could be determined by brute force. The transmitted data is TLS-secured. The address book data is kept only in the volatile memory of the server and is deleted immediately after synchronizing contacts.[51]
If a user chooses to link a phone number or email address with their Threema ID, they can remove the phone number or email address at any time.[52] Should a user ever lose their device (and their private key), they can revoke their Threema ID if a revocation password for that ID has been set.[53]
Groups are solely managed on users’ devices and group messages are sent to each recipient as an individual message, encrypted with the respective public key. Thus, group compositions are not directly exposed to the server.[54]
Data (including media files) stored on the users’ devices is encrypted with AES 256. On Android, it can be additionally protected by a passphrase.[55]
Since 2016, Threema GmbH publishes a transparency report where public authority inquiries are disclosed.[56]
On March 9, 2017, Threema was listed in the "Register of organizers of information dissemination in the Internet" operated by the Federal Service for Supervision of Communications, Information Technology and Mass Media of the Russian Federation.[57]
In a response, a Threema spokesperson publicly stated:[58]
"We operate under Swiss law and are neither allowed nor willing to provide any information about our users to foreign authorities."
On April 29, 2021, Threema won a significant case at the Federal Supreme Court of Switzerland against the Swiss Federal Department of Police and Justice, who wished to classify the company as a telecommunications provider. Had they lost the case, Threema would have had a legal requirement to identify users and send information about their users to law enforcement.[59]
Starting January 2022, Swiss Armed Forces suggested that the troops should use Threema instead of WhatsApp, Telegram and Signal, citing Threema being Swiss-based without servers in the United States and thus not subject to the CLOUD Act, also promising that soldiers would be reimbursed for the cost.[60]
Reception
[edit]In February 2014, German consumer organisation Stiftung Warentest evaluated several data-protection aspects of Threema, WhatsApp, Telegram, BlackBerry Messenger and Line.
It considered the security of the data transmission between clients, the services' terms of use, the transparency of the service providers, the availability of the source code, and the apps' overall availability.
Threema was the only app rated as 'non-critical' (unkritisch) in relation to data and privacy protection, but lost marks due to its closed-source nature, though this has changed for its frontend clients since the end of 2020.[61]
Along with Cryptocat and Surespot, Threema was ranked first in a study evaluating the security and usability of instant messaging encryption software, conducted by the German PSW Group in June 2014.[62]
As of November 2015[update], Threema had a score of 6 out of 7 points on the – now withdrawn and outdated – Electronic Frontier Foundation's "Secure Messaging Scorecard". It received points for having communications encrypted in transit, having communications encrypted with keys the provider doesn't have access to (i.e. having end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having past communications secure if the keys are stolen (i.e. implementing forward secrecy), having its security design well-documented and having completed an independent security audit.
It lost a point because its source code was not open to independent review (i.e. it was not open-source, though in late 2020 its client apps were open-sourced, leaving only its server daemons proprietary).[63]
Since May 2023, Threema and several other encrypted messaging apps are banned in India for their alleged use by terrorists.[64][65]
See also
[edit]References
[edit]- ^ Schurter, Daniel (December 13, 2012). "Die Schweizer Antwort auf WhatsApp" [The Swiss answer to WhatsApp]. 20min.ch (in German). Retrieved July 5, 2014.
- ^ "Release 6.2.1-1098". November 13, 2025. Retrieved November 15, 2025.
- ^ "What's New - Threema". Retrieved March 14, 2022.
- ^ "What's New - Threema". Retrieved April 4, 2022.
- ^ "Threema Source Code on GitHub". GitHub.
- ^ "App Remote Protocol on GitHub". GitHub. May 8, 2021.
- ^ "Support – Threema". threema.ch. Retrieved February 10, 2024.
- ^ Happich, Julien (September 23, 2014). "Privacy gains traction with secure messaging apps". Electronic Engineering Times Europe. Archived from the original on September 23, 2015. Retrieved December 21, 2015.
- ^ a b "Cryptography Whitepaper" (PDF). Retrieved October 30, 2020.
- ^ "FAQ – Privacy Protection". Retrieved October 30, 2020.
- ^ "Will my address book data be sent to your servers?". threema.ch. Retrieved December 2, 2014.[independent source needed]
- ^ a b "What features does Threema offer?". threema.ch.
- ^ "How can I send a file?". threema.ch.
- ^ Bordel, Stefan (January 12, 2015). "Threema integriert Umfrage-Funktion" [Threema integrates survey function]. com! – Das Computer-Magazin (in German). Retrieved October 12, 2015.
- ^ Swiss Confederation. "Swiss company registry entry for Threema GmbH". zefix.ch. Archived from the original on July 7, 2014. Retrieved July 5, 2014.
- ^ Jungfer, Martin (May 28, 2021). "Number of Threema users climbed to over 10 million". digitec.ch. Retrieved August 10, 2021.
- ^ "Threema's Success Story: From the Company's Founding to Today" (PDF). Retrieved May 11, 2021.
- ^ "Messenger for companies and authorities: Threema offers an on-premise version". Market Research Telecast. July 27, 2021. Retrieved August 10, 2021.[dead link]
- ^ "Big Update for Android". threema.ch. December 9, 2014.
- ^ a b Cimpanu, Catalin (August 11, 2020). "Threema joins the ranks of E2EE chat apps that support encrypted video calls". ZDNet. Retrieved October 30, 2020.
- ^ Zorz, Mirko (September 17, 2014). "Secure mobile messaging with Threema". Help Net Security.
- ^ "How long do messages stay in queue for delivery?". threema.ch. Retrieved September 20, 2017.
- ^ "Threema Validation". threema.ch. Archived from the original on November 25, 2018. Retrieved September 20, 2017.
- ^ "External Audit". threema.ch. Retrieved September 20, 2017.
- ^ "Security Review Threema: Security Statement" (PDF). threema.ch. November 2, 2015. Retrieved October 30, 2020.
- ^ Schirrmacher, Dennis (November 3, 2015). "Threema-Audit abgeschlossen: "Ende-zu-Ende-Verschlüsselung ohne Schwächen"" [Threema Audit Completed: "End-to-End Encryption Without Weakness"]. Heise.de (in German). Retrieved October 30, 2020.
- ^ Metzler, Marco (June 28, 2015). "Kryptografie-App Threema: Schweizer sorgen für Privatsphäre" [Cryptography app Threema: Swiss ensure privacy]. Neue Zürcher Zeitung (in German). Retrieved October 8, 2015.
- ^ a b "Im Interview: Threema". Mailify (in German). July 23, 2014. Archived from the original on August 2, 2014. Retrieved October 11, 2015.
- ^ a b Tanriverdi, Hakan. "Der Schlossherr". Der Freitag (in German). ISSN 0945-2095. Retrieved October 11, 2015.
- ^ Price, Rob (June 18, 2015). "Germany's most popular paid app is a secure messenger loved by millions — now it's taking on the US". Business Insider UK. Retrieved October 11, 2015.
- ^ Dillet, Romain (February 21, 2014). "Bye Bye, WhatsApp: Germans Switch To Threema For Privacy Reasons". TechCrunch.
- ^ "Threema GmbH, Pfäffikon SZ". Shabex.ch. Retrieved October 11, 2015.
- ^ Rafaela Roth (January 8, 2022). "Der Mann, der die Camouflage-App der Schweizer Armee entwickelte". Neue Zürcher Zeitung (in German). Retrieved January 15, 2025.
- ^ "iOS-Highlights: Die besten Apps des Jahres" [The best apps of the year]. Focus (in German). December 9, 2014. Retrieved March 1, 2016.
- ^ Cimpanu, Catalin (September 4, 2020). "Threema E2EE chat app to go 'fully open source' within months". ZDNet. Retrieved October 30, 2020.
- ^ "AFINUM acquires Threema". www.vischer.com. Retrieved June 21, 2025.
- ^ "WhatsApp-Konkurrenten verzeichnen starken Nutzeranstieg". Die Zeit (in German). January 13, 2021. Retrieved January 13, 2021.
- ^ Pladson, Kristie (January 18, 2021). "WhatsApp controversy highlights growing fears about data privacy". DW. Retrieved January 19, 2021.
- ^ "Three Lessons from Threema: Analysis of a Secure Messenger". breakingthe3ma.app. Retrieved January 10, 2023.
- ^ "Meet Robin Simon at PMF". productmanagementfestival.com. Retrieved June 25, 2025.
- ^ Bundesamt für Justiz (BJ) (September 12, 2024). "Mutation Threema GmbH, Freienbach" (PDF). Schweizerisches Handelsamtsblatt (in German). Retrieved August 16, 2025.
- ^ "The messenger for organizations". work.threema.ch.
- ^ "Pricing Threema Work".
- ^ Iseli, Marc (September 28, 2015). "US-Feldzug von Threema gerät ins Stocken" [US campaign of Threema is stalled]. Handelszeitung (in German). ISSN 1422-8971. Retrieved October 12, 2015.
- ^ "Threema GmbH". GitHub. Retrieved September 20, 2017.
- ^ "Threema Education: Framework Contract with educa.ch". September 10, 2020. Retrieved October 25, 2020.
- ^ "Threema OnPrem". Threema. Retrieved August 10, 2021.
- ^ "Reference Sheet Privacy and Security" (PDF). threema.ch. p. 2.
- ^ "Threema Cryptography Whitepaper" (PDF). threema.ch. p. 11.
- ^ "Will my address book data be sent to your servers?". threema.ch.
- ^ "How can I unlink my Threema ID from an email address or phone number?". threema.ch.
- ^ "Revoke your ID". threema.ch.
- ^ "Threema Cryptography Whitepaper" (PDF). threema.ch. p. 5.
- ^ "Are messages encrypted when they are stored on my device?". threema.ch.
- ^ "Transparency Report". threema.ch.
- ^ "Threema GmbH". rublacklist.net (in Russian). Archived from the original on June 20, 2017. Retrieved September 20, 2017.
- ^ "Russia adds international messenger Threema to official registry". East-West Digital News. March 16, 2017. Retrieved January 27, 2018.
- ^ Bannister, Adam (May 28, 2021). "Threema, the European rival to Signal, wins pivotal privacy battle in Swiss Court". The Daily Swig. Retrieved August 10, 2021.
- ^ "Swiss army backs home-grown IM service amid privacy concerns". AP NEWS. January 5, 2022. Retrieved January 10, 2022.
- ^ "WhatsApp und Alternativen: Datenschutz im Test" [WhatsApp and alternatives: data protection tested]. Stiftung Warentest (in German). February 26, 2014. Retrieved October 30, 2020.
- ^ Heutger, Christian (June 13, 2014). "Die Ergebnisse unseres großen Messenger-Tests" [The results of our great messenger test]. PSW Group (in German). Retrieved October 30, 2020.
- ^ "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. November 3, 2015. Archived from the original on April 14, 2016. Retrieved October 30, 2020.
- ^ "India has blocked 14 mobile messenger apps on security fears". Quartz. May 1, 2023. Retrieved April 28, 2025.
- ^ "India first democracy to ban encrypted messaging apps on massive scale". Tuta. Retrieved April 28, 2025.
External links
[edit]- Official website

- Introduction to Threema Archived January 12, 2021, at the Wayback Machine
- Alleged vulnerabilities
Threema
View on GrokipediaThreema is a paid instant messaging application developed by Threema GmbH, a company based in Switzerland, launched in 2012 with a focus on user privacy and security.[1][2]
Unlike many competitors, it does not require a phone number or email address for registration, instead assigning users a randomly generated Threema ID to enable anonymous communication.[3][4]
The app employs end-to-end encryption for all messages, voice and video calls, group chats, and file transfers, utilizing open-source cryptographic protocols, with servers hosted exclusively in Switzerland to leverage strict data protection laws.[5]
Threema avoids data collection for advertising purposes and offers no free tier reliant on user tracking, positioning it as a premium alternative in the secure messaging market.[1]
However, a 2023 peer-reviewed analysis by researchers at ETH Zurich identified seven cryptographic vulnerabilities in Threema's protocols, enabling potential attacks such as message decryption or impersonation under specific threat models, prompting debates over its security claims despite subsequent patches.[6][7]
Company and Development
Founding and Ownership
Threema, a secure messaging application emphasizing end-to-end encryption and user privacy, originated in Switzerland in late 2012 when software developer Manuel Kasper initiated its development as an independent alternative to mainstream apps like WhatsApp, initially under the entity Kasper Systems GmbH.[8] The app's beta version was released on December 13, 2012, for iOS, followed by Android shortly thereafter, driven by Kasper's focus on implementing robust cryptographic protocols from the outset without reliance on external servers for key management.[9] In spring 2014, Threema GmbH was formally established in Pfäffikon, Switzerland, to support the app's commercial expansion, with Kasper joined by fellow developers Silvan Engeler and Martin Blatter as co-founders.[9] [10] These three individuals, all Swiss software engineers, retained operational control and shaped the company's commitment to Swiss data protection laws and minimal data retention practices.[11] Threema GmbH operated as a privately held entity until September 2020, when Swiss investment firm AFINUM Partners AG acquired a majority stake to fund further growth while preserving the founders' vision of privacy-centric development.[12] [8] The original founders—Kasper, Engeler, and Blatter—continued in leadership roles, maintaining a significant minority ownership interest to ensure alignment with core principles such as open-source client code and server-side transparency reports.[11] In January 2026, German private equity firm Comitis Capital announced an agreement to acquire Threema Holding AG from AFINUM Partners AG and the founders, with closure expected in the same month.[13] Comitis Capital committed to supporting Threema's growth and international expansion while preserving management continuity, the privacy-by-design philosophy, open-source software, and Swiss sovereignty.[13] Threema remains funded primarily through paid subscriptions.[9]Business Model and Sustainability
Threema's consumer-facing application requires a one-time purchase fee of approximately 4 to 6 Swiss francs (or equivalent, varying by app store and region), providing users with permanent access, including all updates, without subscriptions, advertisements, or data-based revenue streams. This model contrasts with ad-supported or freemium alternatives by prioritizing user privacy over surveillance capitalism, as the company explicitly avoids tracking, profiling, or selling personal data.[14][15][16] For businesses, Threema offers Threema Work, a subscription-based enterprise edition with tiered plans such as Core at about 3 USD per user per month, incorporating features like centralized user management, on-premises hosting options, and compliance tools for data sovereignty. Additional services, including Threema Broadcast for one-to-many messaging, generate further revenue through scalable licensing. This recurring enterprise income supplements one-time consumer sales, funding server maintenance, cryptographic enhancements, and staff of around 50 employees as of recent reports.[14][17] Founded in 2012 by Manuel Kasper, Silvan Engeler, and Martin Blatter as an independent Swiss entity, Threema initially self-funded through app purchases, achieving profitability without venture capital or data monetization. In September 2020, Afinum Management, a Swiss private equity firm, acquired a majority stake for undisclosed terms, while founders retained a significant minority holding to preserve strategic control and privacy commitments. This infusion supported international expansion and open-sourcing initiatives without shifting to growth-at-all-costs metrics.[12][18] Sustainability derives from lean operations, data minimization principles that reduce infrastructure demands, and a niche market position emphasizing end-to-end encryption and Swiss jurisdiction for regulatory appeal in privacy-sensitive sectors. Operating profitably for over 12 years amid competition from free apps like Signal or WhatsApp underscores the model's resilience, though growth remains constrained by the paid barrier; enterprise adoption and periodic feature expansions mitigate this by diversifying revenue without compromising core tenets.[16][19]Technical Architecture
Client Applications
Threema provides native client applications for Android and iOS mobile operating systems, desktop environments including Windows, macOS, and Linux, and a browser-based web client.[20][21] All clients require an initial setup with a paid license purchased through the respective app stores or official channels, enabling end-to-end encrypted communication without mandatory phone number or email registration.[22][23] The Android client, distributed via the Google Play Store, supports features such as voice and video calls, file sharing up to 50 MB, and integration with device storage for media handling.[22] It is also available in a libre variant called Threema Libre through F-Droid for users avoiding proprietary repositories, though this version necessitates manual license activation.[24] The iOS client, obtainable from the Apple App Store, mirrors these capabilities with iOS-specific optimizations like integration with iMessage-style notifications and support for Live Photos and location sharing.[23] Desktop clients for Windows, macOS, and Linux offer native applications that synchronize fully with the linked mobile device via a one-time QR code scan, providing access to all messages, contacts, and media without retaining data on servers post-decryption.[21] These apps, developed using frameworks like Electron for cross-platform compatibility, include offline message queuing and multi-device session management.[25] In contrast, the Threema Web client operates directly in supported browsers such as Chrome and Firefox, requiring the same QR code pairing for setup and emphasizing temporary session data that clears upon logout or browser closure to minimize persistent storage risks.[26][21] Both desktop and web interfaces prioritize keyboard-driven workflows and larger screen layouts for efficient group management and file previews.[21]Cryptographic Protocols
Threema implements a dual-layer encryption system for all communications, comprising an end-to-end encryption (E2EE) layer between sender and recipient, and a transport layer between clients and servers.[27] The E2EE layer ensures that only the intended recipients can decrypt messages, while the transport layer protects data in transit to prevent server-side interception.[27] This design leverages open-source cryptographic primitives from the NaCl (Networking and Cryptography library), prioritizing security, performance, and minimal message overhead.[27] The core E2EE protocol for one-to-one messaging uses elliptic curve Diffie-Hellman (ECDH) key exchange based on Curve25519 for generating shared secrets from users' long-term public-private key pairs.[27] Each user generates a unique Curve25519 key pair upon initial app setup, with the private key stored securely on the device and the public key uploaded to Threema's directory server for discovery via Threema IDs.[27] Messages are then authenticated and encrypted using XSalsa20 stream cipher combined with Poly1305 message authentication code (MAC), forming an authenticated encryption scheme resistant to chosen-ciphertext attacks.[27] Key derivation employs BLAKE2b and HSalsa20 functions to produce session keys from the ECDH shared secret.[27] To address limitations in the original protocol, such as the absence of perfect forward secrecy (PFS), Threema introduced the Ibex protocol in December 2022, which became the default for E2EE messaging by 2023.[28] Ibex incorporates ephemeral key pairs and a ratcheting mechanism to achieve PFS, ensuring that compromise of long-term keys does not retroactively expose prior sessions.[27] [29] A formal security proof conducted by researchers at the University of Erlangen-Nuremberg in 2023 verified Ibex's confidentiality, integrity, authenticity, and PFS properties, demonstrating that protocol breaches would require solving the Gap Diffie-Hellman problem in polynomial time—an assumption widely held to be computationally infeasible.[29] [30]| Component | Algorithm/Method | Purpose |
|---|---|---|
| Asymmetric Key Exchange | Curve25519 ECDH | Shared secret derivation between long-term keys |
| Symmetric Encryption | XSalsa20 | Message confidentiality |
| Authentication | Poly1305 MAC | Integrity and authenticity |
| Key Derivation | BLAKE2b, HSalsa20 | Session key generation |
| PFS Mechanism | Ibex ratcheting with ephemeral keys | Forward secrecy for sessions |
Server Infrastructure and Data Flow
Threema maintains its primary server infrastructure in Switzerland, operating from two high-security data centers in the Zurich area under an ISO 27001-certified colocation partner.[31] The system employs three server categories: chat servers using a custom TCP-based protocol for message transport with perfect forward secrecy via ephemeral keys per connection; directory servers handling user public keys and Threema IDs over HTTPS; and media servers managing encrypted file uploads and downloads also via HTTPS with TLS 1.3 and public-key pinning.[27] While the core server software remains proprietary and centralized for the standard service, Threema offers an OnPrem variant for self-hosted deployments, allowing organizations to run compatible infrastructure on their own hardware with full data control.[32] Message data flow in Threema prioritizes end-to-end encryption, with servers functioning solely as relays without access to plaintext content. Clients initiate secure client-to-server (C2S) channels through a handshake protocol using long-term identity keys (Curve25519 ECDH) and ephemeral keys to derive session keys, layering transport encryption (XSalsa20-Poly1305) over end-to-end encryption for messages in transit.[27][6] Upon sending, a client encrypts the message payload for the recipient's public key, forwards the double-encrypted blob to a chat server, which routes it to the recipient's connected device or buffers it briefly if offline; no persistent message storage occurs on servers post-delivery.[27] Group messages are individually encrypted to each member's key and sent separately, rendering group structures opaque to servers.[27] Directory servers retain minimal data, including public keys and 8-character Threema IDs assigned randomly upon user registration, but store no address book hashes or persistent message histories.[27] Encrypted media files are uploaded to media servers with a one-time 256-bit symmetric key shared via end-to-end encrypted text, with temporary storage limited to 14 days before deletion.[27] Metadata such as sender/recipient IDs and timestamps is logged transiently for routing, though servers claim no linkage of backups to identities beyond potential IP correlations.[6] Multi-device support involves a mediator server proxying encrypted sync messages between linked devices via QR-code-based key exchanges, ensuring content remains inaccessible to intermediaries.[27] This architecture minimizes server-side data retention, aligning with Swiss privacy standards, though analyses note vulnerabilities to long-term key compromises enabling retrospective decryption of stored ciphertexts.[6]Core Features
Messaging Capabilities
Threema supports sending and receiving text messages in both one-on-one chats and group conversations, with all communications secured through end-to-end encryption using the NaCl cryptography library and protocols such as forward secrecy and perfect forward secrecy.[33][34] Messages include status indicators showing whether they have been sent (single checkmark), delivered to the recipient's device (double checkmark), or read (double checkmark with an eye icon or similar visual cue).[35] These read receipts are optional and can be disabled globally via app settings or overridden on a per-contact basis to prevent metadata leakage about message consumption.[35][36] The app also features typing indicators that alert users when a contact is actively composing a response, promoting natural conversation flow while allowing users to disable this for individual contacts or entirely to minimize unintended privacy disclosures.[37][38] As of August 12, 2024, Threema introduced the ability to edit sent text messages or delete them for all parties involved, including on the recipient's device, provided both users have updated to compatible app versions; edited messages display a note indicating changes, preserving transparency. This functionality applies to text messages but excludes certain types like polls or system messages. Voice messaging complements text capabilities, enabling users to record and send short audio clips that are similarly end-to-end encrypted and support the same receipt statuses.[33][3] Unlike some competitors, Threema does not offer built-in self-destructing messages with custom timers, prioritizing server-independent encryption over ephemeral features that could introduce additional protocol complexities.[33]Group and Multimedia Functions
Threema enables group chats with up to 256 participants, where messages are exchanged among members in a decentralized manner managed entirely on individual devices. Threema's servers maintain no records of group compositions or memberships, enhancing privacy by preventing centralized oversight of participant details.[39] All group messaging is secured via end-to-end encryption, ensuring that only intended recipients can access content.[5] Within groups, users can conduct end-to-end encrypted voice and video calls initiated directly from the chat interface, supporting real-time audio and video communication among members. Group polls allow administrators to collect responses efficiently, with results aggregated privately among participants. Distribution lists provide an alternative for one-way broadcasting to multiple contacts without enabling replies, distinct from interactive groups.[5] Multimedia sharing in Threema includes transmission of photos, videos, voice messages, files in any format up to 100 MB per file, and location data, all protected by end-to-end encryption to prevent interception or server access. Videos can be compressed via app settings to optimize for the size limit, while files exceeding device memory constraints may fail to send on older hardware. Locations are shared as static points or live updates, integrated seamlessly into chats or groups.[5]Privacy and Anonymity Tools
Threema enables user anonymity primarily through its Threema ID system, a randomly generated 8-character alphanumeric identifier assigned upon app installation, which serves as the sole means of identification without requiring a phone number, email address, or any personal data for registration.[40] This design contrasts with apps that mandate verifiable identifiers, allowing users to maintain complete detachment from real-world details unless they opt to link such information voluntarily for contact discovery.[41] As a result, Threema GmbH, the Swiss-based developer, states it has no inherent knowledge of users' identities, as no central database ties IDs to personal attributes absent user-initiated associations.[41] To preserve anonymity, Threema minimizes server-side data retention and avoids automatic contact syncing; users must explicitly enable features that hash and transmit phone numbers or emails for syncing, which can be skipped entirely.[42] Contact verification occurs via direct QR code scanning between devices, bypassing server mediation and reducing metadata exposure.[42] The app also supports anonymous group creation and participation, where initiators can generate links without revealing sender details, and features like polls ensure voter responses remain unlinked to participants' IDs.[43] Threema eschews self-destructing messages, citing their unreliability due to recipients' ability to screenshot or copy content before deletion, opting instead for local message storage and user-controlled deletion tools, such as bulk chat cleanup or automatic archival after inactivity periods.[44] Backups via Threema Safe use end-to-end encrypted, user-held keys stored separately, preventing server access even if enabled. These mechanisms collectively prioritize sustained anonymity over ephemeral features that could foster a false sense of security.[45]Historical Development
Inception and Early Launch (2012–2015)
Threema was conceived in 2012 by three young Swiss software developers seeking to create an independent messaging application for secure communication among friends, at a time when mainstream apps like WhatsApp lacked robust end-to-end encryption.[11] The initial development effort was led by Manuel Kasper, who authored the first version amid growing concerns over message interception and data sharing in existing platforms.[46] The app's inaugural release occurred on December 12, 2012, with the iOS version debuting in Apple's App Store under the name "Threema," followed promptly by an Android counterpart.[9][47] From launch, Threema operated as a paid service without advertising or user data collection, prioritizing end-to-end encryption via the NaCl library and optional user anonymity through randomly generated IDs rather than phone numbers or emails.[9][48] Early adoption remained modest until early 2014, when Facebook's acquisition of WhatsApp triggered widespread privacy apprehensions, propelling Threema's user base from hundreds of thousands to over 2 million within weeks.[11] This surge underscored the app's appeal as a Swiss-based alternative emphasizing server-side message deletion post-delivery and minimal metadata retention.[9] By mid-2015, Threema expanded into the U.S. market, marketing its encryption features to users wary of surveillance amid discussions of apps' roles in counterterrorism.[49] During this period, the company, Threema GmbH, focused on cross-platform compatibility and iterative security enhancements, establishing a foundation for its no-subscription, one-time-purchase model that avoided reliance on user data monetization.[10]Growth Phases and Milestones (2016–2020)
In 2016, Threema launched Threema Work, an enterprise-oriented version of its messenger tailored for companies, public authorities, and organizations, emphasizing user-friendliness alongside stringent data protection to meet emerging regulatory demands.[9] This marked a shift toward professional markets, building on the app's consumer base established since 2012.[11] By 2017, Threema expanded its feature set with the introduction of Threema Web for desktop-based chatting and end-to-end encrypted voice calls that did not require disclosing phone numbers, enhancing usability without compromising anonymity.[9] These additions supported gradual user adoption amid growing privacy concerns in Europe, though exact quarterly growth figures remain undisclosed by the company. The enactment of the EU's General Data Protection Regulation (GDPR) in 2018 propelled demand for Threema Work, as organizations sought compliant communication tools; concurrently, Threema released Broadcast for one-to-many messaging and Safe for encrypted backups.[9] User base expansion continued steadily, reflecting Threema's positioning as a privacy-focused alternative to dominant apps like WhatsApp. In 2019, an independent security audit by the University of Münster validated the robustness of Threema's core app and Threema Safe, affirming its cryptographic integrity against common vulnerabilities.[9] This external verification bolstered credibility among enterprise adopters. By January 2020, Threema's overall user base surpassed 8 million, including over 2 million Threema Work users across approximately 5,000 organizations.[50] That year, the company secured investment from Afinum to ensure long-term stability and development, while adding end-to-end encrypted video calls in response to heightened remote communication needs during the emerging COVID-19 pandemic; additionally, on September 10, Threema Education was released, adapting the platform for educational institutions with integrated broadcast features.[9]Recent Updates and Events (2021–2025)
In 2021, Threema launched OnPrem, a self-hosted version of its messaging platform designed for organizations seeking full control over data and infrastructure, enabling deployment on private servers to enhance security and compliance.[51] This release addressed demands from enterprise users for on-premises solutions amid growing concerns over cloud-based data storage.[52] A significant event occurred in January 2023 when researchers from ETH Zurich published an analysis at the USENIX Security Symposium, identifying seven cryptographic vulnerabilities in Threema's protocols, including issues with key separation, side-channel attacks on private key recovery, and flaws in authentication mechanisms that could enable message decryption or impersonation under specific threat models.[53] The findings, detailed in a peer-reviewed paper, highlighted risks such as lack of proper forward secrecy and recoverable plaintext from past sessions in certain scenarios, though the researchers noted these required advanced adversary capabilities.[6] Threema responded officially, asserting that the alleged weaknesses had no real-world impact due to mitigations in implementation and that no exploits were demonstrated against deployed systems, while committing to protocol reviews without admitting exploitable flaws.[54] In April 2024, Threema showcased its OnPrem solution at the GISEC Global cybersecurity exhibition in Dubai, emphasizing self-hosting capabilities for data sovereignty and integration with enterprise environments.[52] This event underscored the platform's appeal to sectors prioritizing operational independence from third-party servers. Throughout 2025, Threema continued iterative updates, including a June 5 release for Threema Broadcast (version 2.24.0) featuring a refreshed logo, updated color scheme aligning with corporate rebranding, and general performance enhancements with bug fixes.[55] Concurrently, proposed amendments to Switzerland's Surveillance Act (VÜPF) drew scrutiny, with the Federal Council initiating public consultation in January 2025 to expand law enforcement access, potentially requiring encrypted services like Threema to implement user identification, metadata retention, and decryption backdoors—measures critics likened to authoritarian precedents and which Threema's privacy model, reliant on minimal data collection, would complicate.[56] The consultation concluded in May 2025 amid opposition from privacy advocates, highlighting tensions between national security imperatives and Switzerland's reputation for data protection.[57]Security and Privacy Analysis
Encryption Mechanisms and Audits
Threema employs end-to-end encryption for all messages, calls, and file transfers, utilizing the NaCl (Networking and Cryptography) library's crypto_box primitive. This implementation leverages Curve25519 elliptic curve Diffie-Hellman for asymmetric key exchange, XSalsa20 stream cipher for symmetric encryption, and Poly1305 for message authentication, providing 255-bit security equivalent strength.[27] Each user generates a unique key pair upon app installation, with the public key forming part of their anonymous Threema ID; messages are encrypted directly to the recipient's public key without server involvement in decryption.[27] A separate transport encryption layer secures client-server communication using analogous NaCl mechanisms, ensuring data confidentiality even if intercepted en route.[27] Prior to 2022, the protocol used static long-term keys for ongoing sessions, omitting forward secrecy and relying on bidirectional X25519 key derivation without ephemeral keys or ratcheting.[6] This design facilitated persistent access to past messages if a private key were compromised post-session. In December 2022, Threema deployed the Ibex protocol to address these limitations, incorporating X3DH for initial key establishment, a double-ratchet mechanism for forward secrecy and post-compromise security, and Noise Protocol Framework elements for handshake security.[28] Ibex applies per-message ephemeral keys and symmetric ratcheting to derive session keys, mitigating key reuse and enabling secure key rotation.[30] Threema's codebase, being open-source since 2015, has undergone multiple third-party audits. In October 2020, Cure53 assessed the iOS and Android apps, identifying 12 vulnerabilities (primarily implementation flaws like improper input validation and side-channel risks) rated medium to high severity, all of which Threema remediated prior to public release of the report.[58] Further Cure53 reviews in 2022 targeted Rust-based crypto libraries, uncovering minor issues in key handling fixed in subsequent updates, and in January 2024 examined the desktop app, finding no critical flaws but recommending UI hardening.[59][60] An independent analysis by ETH Zurich researchers, published at USENIX Security 2023, scrutinized the pre-Ibex protocols and demonstrated seven cryptographic attacks across three threat models, including cross-protocol key recovery (allowing impersonation via downgrades), lack of indistinguishability against chosen-ciphertext attacks, and offline recovery of messages from compromised devices without forward secrecy.[6] Proof-of-concept exploits confirmed practical feasibility under realistic assumptions, such as server compromise or device theft, though no widespread real-world exploitation was reported. Threema's rollout of Ibex predated the full paper but aligned with early findings; a commissioned 2023 security analysis of Ibex verified its resistance to standard attacks like key-compromise impersonation and provided formal proofs for core properties under the Dolev-Yao model.[30][29] Threema characterized the USENIX findings as having limited practical impact due to mitigations like device-bound keys, a stance critiqued by security experts for understating protocol-level risks in secure messaging standards.[61]Metadata Handling and Jurisdiction
Threema minimizes metadata collection to the extent technically feasible, generating only transient data necessary for message delivery and deleting it immediately thereafter. Servers maintain no logs linking user IDs or recording communication partners, groups, or timestamps beyond delivery confirmation, ensuring that the platform cannot reconstruct contact networks or interaction histories.[62][42] This decentralized architecture avoids central storage of personal data, with contact lists and group memberships handled locally on user devices rather than uploaded to servers.[63] Users operate via a randomly generated 8-digit Threema ID, requiring no phone number, email, or other identifiers, though optional linking to such details is hashed and used temporarily if provided.[42] IP addresses are logged for 10 days solely for abuse prevention and deleted afterward, while no behavioral analytics or user profiling occurs from metadata.[64][42] Independent analyses, such as a 2023 USENIX Security paper, confirm Threema's metadata restraint aligns with its privacy claims, though they note potential for device-level leaks if users enable optional features like contact synchronization.[6] As a Swiss entity headquartered in Pfäffikon SZ, Threema operates under the Swiss Federal Act on Data Protection (FADP), which mandates strict data minimization and user rights without the expansive surveillance mandates found in U.S. or some EU frameworks.[64] Servers are hosted exclusively in two ISO 27001-certified data centers in Zurich, Switzerland, precluding foreign jurisdiction over core operations.[64][63] For EU/EEA users, GDPR compliance supplements FADP, but Swiss law governs primary processing.[64] This jurisdiction has enabled resistance to overreach; in May 2021, the Swiss Federal Supreme Court ruled against compelled disclosure of user data to law enforcement absent probable cause, affirming Threema's non-cooperation with broad requests.[65] Switzerland's neutrality and robust privacy standards prompted the Swiss Armed Forces to mandate Threema over WhatsApp in 2022, citing concerns with U.S.-based apps' exposure to entities like the NSA.[66] Threema reports zero successful foreign data handovers, attributing this to limited retained data and Swiss legal barriers.[42]Identified Vulnerabilities and Fixes
In January 2023, researchers from ETH Zurich published an analysis identifying seven cryptographic vulnerabilities in Threema's protocols, presented at the USENIX Security Symposium.[6] These flaws spanned three threat models: passive network attacks allowing message reordering and selective decryption; active network attacks exploiting nonce reuse for message forgery; compromised server scenarios enabling replay or reflection of messages to users without nonce databases (e.g., after app reinstallation); and compelled access attacks recovering private keys from backups via a compression oracle in the Zip4j library (assigned CVE-2023-22899).[67][68] The researchers emphasized that Threema's custom protocol deviated from cryptographic standards, such as lacking mandatory metadata boxes and relying on optional nonce synchronization, which facilitated these issues.[69] Threema acknowledged the disclosure, which occurred responsibly on October 3, 2022, and stated that all vulnerabilities were patched by January 2023 without evidence of real-world exploitation.[54] Key fixes included mandating metadata boxes to prevent reordering and replay attacks, enhancing nonce management to mitigate forgery risks, and updating backup encryption to address the Zip4j oracle vulnerability by improving MAC verification during decryption.[6] Threema introduced the Ibex protocol update to enforce these protections, rendering prior attacks infeasible in updated versions.[70] The company commissioned prior independent audits (e.g., by Cure53 in 2015 and 2020), which did not uncover these specific protocol flaws, highlighting the value of ongoing external scrutiny.[71] A public dispute arose when Threema downplayed the flaws' severity, claiming some targeted an outdated protocol and lacked practical impact, prompting researcher rebuttals that the issues affected current implementations and underscored broader lessons in secure messenger design.[72][73] No subsequent major vulnerabilities have been publicly disclosed as of October 2025, with Threema maintaining open-source code for community verification and continuing periodic audits.[74]Enterprise and Related Offerings
Threema Work
Threema Work is the enterprise-oriented variant of the Threema messaging application, designed to enable secure, privacy-compliant communication within organizations. It extends the consumer version's capabilities with administrative tools for user oversight, policy enforcement, and integration with enterprise systems, while maintaining end-to-end encryption for all interactions.[75] This setup supports text messaging, voice and video calls, group chats, polls, and file sharing of various formats, including PDFs and Office documents, across mobile, desktop, and web clients.[75][76] Administrators access a centralized management cockpit to handle user provisioning, group and broadcast list management, and contact controls, with support for mobile device management (MDM) systems and API integrations for automation, such as Active Directory synchronization.[75][77] Upcoming add-ons include EasyConnect for QR-code-based external messaging and Circles for granular visibility controls among users.[75] Unlike the consumer app, Threema Work enforces separation of personal and professional communications, offers enhanced compliance reporting, and provides options for on-premises deployment to retain data sovereignty.[75] Security features encompass end-to-end encryption with perfect forward secrecy, a zero-knowledge architecture that prevents server-side access to message contents, and regular independent security audits.[75] Data is processed and stored exclusively on ISO 27001-certified servers in Switzerland, adhering to stringent Swiss privacy laws and the European Union's General Data Protection Regulation (GDPR), without mandating phone numbers or email addresses for user identification.[75] This jurisdiction avoids data-sharing obligations under laws like the U.S. CLOUD Act, prioritizing user anonymity and minimal metadata collection.[75] Pricing follows annual subscription models per user: the Core plan costs €3.00 monthly and includes fundamental secure messaging with central user management; the Professional plan at €5.00 adds advanced administrative options like automated workflows and one-to-many broadcasting; the OnPrem variant, priced on request, allows self-hosting for full infrastructure control.[14] A 30-day free trial is available for up to 30 users.[14] As of recent reports, Threema Work serves over 8,000 organizations globally, emphasizing its adoption for confidential business operations.[75]Specialized Services (Gateway, OnPrem, etc.)
Threema Gateway enables organizations to integrate Threema messaging into their existing software applications through a dedicated API, facilitating automated sending and receiving of messages to Threema users.[78] Launched in March 2015, the service supports text messages up to 3,500 characters, images, files of any type, and custom IDs with profile pictures for specialized use cases such as two-factor authentication, ERP integrations, IoT notifications, and chatbots.[79][78] It operates via HTTPS requests to the Gateway server, with options for basic or end-to-end encryption, and requires no mobile network coverage, relying instead on internet connectivity.[78] Compared to SMS gateways, it offers superior security through asymmetric cryptography and verifiable open-source encryption protocols, lower costs with per-message pricing starting at CHF 0.01 and no recurring fees, and greater reliability without carrier dependencies.[78] Threema OnPrem is a self-hosted variant of the Threema platform designed for organizations prioritizing data sovereignty and operational independence from cloud providers.[32] It deploys on customer-owned servers, eliminating data transmission to external parties and ensuring compliance with Swiss data protection standards and GDPR requirements through end-to-end encryption and a zero-knowledge proof architecture.[32] Core functionalities mirror the standard app, including one-on-one and group chats, voice and video calls, file sharing, and polls, alongside administrative features like user lifecycle management, MDM integration, and BYOD policies via a dedicated portal.[32] Unlike the SaaS-based Threema Work, OnPrem maintains a closed, network-independent system with no central metadata storage, reducing exposure to cyber threats and enabling customization through add-ons such as whitelabeling.[32] Deployment supports cross-platform access on mobile and desktop devices, with licensing tied to self-managed infrastructure rather than subscriptions.[32]Reception and Critiques
Adoption Metrics and User Base
Threema maintains a global user base exceeding 12 million individuals, with over 8,000 business customers utilizing its services as of 2025.[80][81] This figure encompasses active and registered users across its consumer and enterprise variants, reflecting steady adoption driven by its emphasis on metadata minimization and Swiss jurisdiction.[9] The platform's paid, one-time subscription model—priced at approximately CHF 4 per user—contrasts with ad-supported competitors, resulting in a self-selected cohort prioritizing privacy over free access.[14] User growth originated modestly upon launch in 2012 but surged post-2013 following heightened public awareness of surveillance via Edward Snowden's disclosures, expanding to 250,000 users within months.[50] By mid-2021, the base had reached over 10 million, including notable institutional uptake such as the Swiss federal government, Swiss Armed Forces, and German Chancellor Olaf Scholz.[82][48] Subsequent increments to 11–12 million by 2022–2025 indicate moderated expansion, concentrated in German-speaking Europe where regional surveys highlight Threema's prominence among secure messengers in Switzerland.[83]| Milestone | Approximate Users | Date/Context |
|---|---|---|
| Initial Surge | 250,000 | 2013 (post-Snowden awareness)[50] |
| Mid-Growth | 10 million+ | May 2021 (consumer base)[82] |
| Recent Total | 12 million+ (individuals); 8,000+ businesses | 2025 (global)[80][81] |