The only messaging app designed to put you in control

The only messaging app designed to put you in control

The only messaging app designed to put you in control

The only messaging app designed to put you in control

Where privacy meets unmatched personalisation

Where privacy meets

unmatched personalisation

Where privacy meets

unmatched personalisation

No sign-up required

No sign-up required

What we offer is simple: total control

What we offer is simple:

total control

What we offer is simple:

total control

Control your contact info

Control your contact info

Control your contact info

Control your

contact info

We’ve deprecated contact info using the Port protocol. We never ask for phone numbers, email IDs or usernames, nor do we want you to share it. ​


Connect freely over Port QRs and links, and keep your personal info personal.​

We’ve deprecated contact info using the Port protocol. We never ask for phone numbers, email IDs or usernames, nor do we want you to share it. ​


Connect freely over Port QRs and links, and keep your personal info personal.​

We’ve deprecated contact info using the Port protocol. We never ask for phone numbers, email IDs or usernames, nor do we want you to share it.


​Connect freely over Port QRs and links, and keep your personal info personal.​

We’ve deprecated contact info using the Port protocol. We never ask for phone numbers, email IDs or usernames, nor do we want you to share it. ​


Connect freely over Port QRs and links, and keep your personal

info personal.​

Decide who can reach you

Decide who can reach you

Decide who can reach you

When you have no contact info, spammers have nothing to target. Share Ports with people you choose to talk to.


Enjoy the superpower of deciding which contacts can connect you with others. 

When you have no contact info, spammers have nothing to target. Share Ports with people you choose to talk to.


Enjoy the superpower of deciding which contacts can connect you with others. 

When you have no contact info, spammers have nothing to target. Share Ports with people you choose to talk to.


Enjoy the superpower of deciding which contacts can connect you with others. 

Your chats,

your rules

Your chats, your rules

Your chats,

your rules

Not all contacts are created equal. Personalize everything. Choose who can ping you, who can add you to groups and who can connect you with others.

Not all contacts are created equal. Personalize everything. Choose who can ping you, who can add you to groups and who can connect you with others.

Not all contacts are created equal. Personalize everything. Choose who can ping you, who can add you to groups and who can connect you with others.

Not all contacts are created equal. Personalize everything. Choose who can contact you, who can add you to groups and who can connect you with others.

Navigate the chaos with folders

Navigate the chaos with folders

Navigate the chaos with folders

Folders are baked into Port at every level to keep your conversation space organized. Pin close contacts to your 'Home Screen' while easily tagging others to relevant folders.


New chats automatically go to the right folder and inherit the controls you've set. ​

Folders are baked into Port at every level to keep your conversation space organized. Pin close contacts to your 'Home Screen' while easily tagging others to relevant folders.


New chats automatically go to the right folder and inherit the controls you've set. ​

Folders are baked into Port at every level to keep your conversation space organized. Pin close contacts to your 'Home Screen' while easily tagging others to relevant folders.


New chats automatically go to the right folder and inherit the controls you've set. ​

Privacy and security is default

Privacy and security is default

Privacy and security is default

We don’t collect any personal information—your name and profile picture remain private,

even to us.


Every chat is end-to-end encrypted, ensuring your conversations stay secure.


The Port Protocol manages secondary authentication automatically, adding an extra layer of security, with no risk of impersonation.


We don’t collect any personal information—your name and profile picture remain private, even to us.


Every chat is end-to-end encrypted, ensuring your conversations stay secure.


Port’s protocol manages secondary authentication automatically, adding an extra layer of security, with no risk of impersonation.


We don’t collect any personal information—your name and profile picture remain private, even to us.


Every chat is end-to-end encrypted, ensuring your conversations stay secure.


The Port Protocol manages secondary authentication automatically, adding an extra layer of security, with no risk of impersonation.


We don’t collect any personal information—your name and profile picture remain private, even to us.


Every chat is end-to-end encrypted, ensuring your conversations stay secure.


The Port Protocol manages secondary authentication automatically, adding an extra layer of security, with no risk of impersonation.


For more details, check out our technical information

For more details, check out our technical information

Read more about it in our technical blogs

Get started on Port today!

Get started on Port today!

Get started on Port today!

Connect

Connect

Personalize

Personalize

Chat

Chat

FEATURED IN

FEATURED IN

FEATURED IN

FEATURED IN

Scan here to download Port

Start connecting on your

terms today

Start connecting on your terms today

Start connecting on your

terms today

Download now

AVAILABLE ON

AVAILABLE ON