');mask-image:url('data:image/svg+xml;utf8,')}.icon-attack-vector{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-direct-tunnel{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-ephemeral{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-e2ee{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-integrity{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-no-cookies{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-no-profile{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-no-history{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.icon-volatile{-webkit-mask-image:url('data:image/svg+xml;utf8,');mask-image:url('data:image/svg+xml;utf8,')}.diagram-container{margin:2rem 0;text-align:center}.diagram-svg{max-width:100%;height:auto;width:500px}.comparison-table{width:100%;border-collapse:collapse;margin-top:2rem;border:1px solid var(--medium-gray-color);border-radius:var(--border-radius);overflow:hidden}.comparison-table td,.comparison-table th{padding:1rem;text-align:left;border-bottom:1px solid var(--light-gray-color)}.comparison-table th{background-color:var(--light-gray-color);color:var(--primary-color);font-size:1rem}.comparison-table td{color:var(--dark-gray-color);vertical-align:middle}.comparison-table tbody tr:last-child td{border-bottom:none}.comparison-table .icon-check{color:var(--success-color);font-weight:700;font-size:1.5rem;line-height:1}.comparison-table .icon-cross{color:#f44336;font-weight:700;font-size:1.5rem;line-height:1}.comparison-table td:nth-child(2),.comparison-table td:nth-child(3){text-align:center}.comparison-table td:first-child{font-weight:700;color:var(--text-color)}.final-quote-section{margin-top:4rem;padding:4rem 2rem;background-color:var(--primary-color);color:#fff;border-radius:var(--border-radius);text-align:center}.final-quote-section h2{color:#fff;font-size:2rem;line-height:1.4;max-width:25ch;margin:0 auto}@media (max-width:768px){.app-container{margin:.5rem;padding:1rem}h1{font-size:1.8rem}h2.page-subtitle{font-size:1.1rem}h2.section-title{font-size:1.5rem}.comparison-table{display:block;width:100%}.comparison-table thead{display:none}.comparison-table tbody,.comparison-table td,.comparison-table tr{display:block;width:100%}.comparison-table tr{border-bottom:2px solid var(--primary-color);margin-bottom:1.5rem;padding-bottom:1rem}.comparison-table tr:last-child{border-bottom:none;margin-bottom:0;padding-bottom:0}.comparison-table td{display:flex;justify-content:space-between;align-items:center;text-align:right;padding:.5rem;border:none}.comparison-table td::before{content:attr(data-label);font-weight:700;text-align:left;margin-right:1rem;color:var(--primary-color);flex-shrink:0}}
Unlike traditional services, your conversations are never stored or relayed through our servers. The call takes place exclusively between your devices.
By removing the central server from the call process, we eliminate the largest point of vulnerability. There is no call database to hack.
The connection is a pure peer-to-peer (P2P) tunnel. This is the most direct and private form of communication, ensuring that only the person you are calling can hear you.
An ephemeral 2-minute pairing code allows your devices to find each other via a minimalist signaling channel. This channel only exchanges the technical data needed to create the direct tunnel, then it disappears. It never sees your conversation.
The direct WebRTC connection is reinforced by mandatory end-to-end encryption (DTLS-SRTP). No one can intercept and listen to your conversation in transit—not us, not your ISP, and not an attacker on your network.
The secure protocol (SRTP) used for voice transport guarantees not only confidentiality but also the integrity of the audio packets, protecting you against data tampering or injection into the conversation.
We do not use any tracking or session cookies. Your usage is completely anonymous and cannot be linked to other web activities.
We never ask for an email, username, or personal information. When you close the tab, your temporary session disappears.
Since calls do not pass through our servers, we have no record of who you called, or when. It's technically impossible.
Your call's audio is a real-time data stream. It is processed by your device's RAM and is never written to the browser cache, local storage, or the disk. Once the call ends and the tab is closed, the conversation has evaporated, leaving no residual data to be recovered.
Feature | iCanPhone (Peer-to-Peer) | Traditional Services |
---|---|---|
Voice Path | Device ➡️ Device | Device ➡️ Server/Carrier ➡️ Device |
Access to Conversations | ✓ Impossible | ✗ Possible (or likely) |
End-to-End Encryption | ✓ Mandatory and unbreakable | ✗ Often optional or absent |
User Identity | ✓ Anonymous (no accounts) | ✗ Required (phone #, email) |
Tracking Cookies | ✓ None | ✗ Yes (ads, analytics) |
Call History | ✓ None | ✗ Yes (billing, metadata) |