Philosophy

Why Your Privacy App Shouldn't Look Like One.

2026-04-14 6 min read

The Visibility Problem

Most privacy tools are conspicuous. Signal, Tor Browser, ProtonMail—they all have one thing in common: having them on your device tells people you have something to hide.

In certain contexts, this visibility can be dangerous. A journalist in an authoritarian country. A person in an abusive relationship. An activist under surveillance. For these people, the mere presence of a privacy app is incriminating evidence.

The privacy tool itself becomes a signal. And signals can be used against you.

Steganography vs. Cryptography

Cryptography

Protects the content of a message. An attacker knows communication is happening but cannot read it. The ciphertext itself is evidence that something was encrypted.

Steganography

Hides the existence of the message. An attacker doesn't even know communication is happening. There is nothing suspicious to investigate.

sTELgano combines both. Messages are encrypted with AES-256-GCM (cryptography), and the entire communication channel is hidden inside a phone contact (steganography). Two layers of protection instead of one.

The Contact Layer

A phone number in your contacts is the most ordinary thing in the world. Nobody questions it. Nobody examines the numbers saved in your phone to see if they're "real."

That's the hiding place. A randomly generated phone number, saved under an unremarkable name in your contacts, is the seed for an entire encrypted communication channel. The steg number looks like any other contact. It IS a contact. It just happens to also be a key.

What a Suspicious Person Sees

They open your phone. They see contacts. Normal. Hundreds of names and numbers like every other phone.

They open sTELgano—if they even find it. There's no app to find. It's a website. They'd have to know the URL. And even the name reveals nothing—“sTELgano” is intentionally obscure, designed to look like any forgettable utility if it appears in browser history. The steganography starts at the brand.

But say they do find it. What do they see? A blank form asking for a number and PIN. No messages. No history. No contacts list. No "recent chats." Nothing to explain. Nothing to incriminate.

[ Blank entry screen. Two fields. Nothing else. ]

This is the passcode test. Every feature in sTELgano must pass it.

Even the Name

The hiding starts before you open the app. sTELgano — pronounced stel-GAH-no — is a portmanteau of steganography and TEL, the contact layer it lives inside.

To anyone not looking for it, the word is forgettable noise in a browser history. To the two people who share a channel, it is insider vocabulary. The brand is doing the same work as the rest of the system: one thing to the two of you, nothing to everyone else.

Design Implications

This philosophy constrains every design decision we make:

  • No notification badges. Ever. Nothing pops up on the home screen.
  • No message previews. Not in notifications, not in the app switcher.
  • No "last seen" indicators. No typing indicators visible outside the session.
  • No contact list inside the app. You enter a number each time.
  • No chat history. One message per room. Reply deletes the previous.
  • SessionStorage only. Close the tab and the session is gone.
  • Even the name is steganographic. "sTELgano" reveals nothing to a casual observer.

Conclusion

The safest secret is the one nobody knows exists.

Privacy isn't just about encryption strength or key sizes. It's about whether anyone even suspects there's something to look for. When the hiding place is the most mundane object on your phone—a contact—suspicion never arises.