All News

Jack Dorsey Launches Offline Chat App Bitchat

Jack Dorsey’s Bitchat launched on iOS, offering peer-to-peer messaging via Bluetooth mesh networks without internet. The minimal-UX app requires no login and lets users chat within 100 meters. While suited for festivals or emergencies, security experts warn of impersonation risks and lack of external audits. Growing fake clones on Google Play further complicate adoption of Dorsey’s offline chat solution.

Published July 29, 2025 at 11:11 AM EDT in IoT

Jack Dorsey, co-founder of Twitter and Block, has quietly launched Bitchat on iOS, a peer-to-peer messaging app powered by Bluetooth mesh networking that operates without Wi-Fi or cellular service.

Bluetooth Mesh Messaging in Your Pocket

Bitchat’s user experience is stripped-down. Without any login or onboarding, users open the app and immediately see a chat window displaying messages from anyone nearby. Names are user-defined and editable at any time.

  • Operates entirely on Bluetooth mesh within roughly 100 meters
  • No internet, Wi-Fi, or cellular required
  • Minimal interface with instant chats and adjustable display names

Bluetooth-powered messaging isn’t new — it’s a go-to solution at crowded festivals and disaster zones where networks falter. Bridgefy, for example, gained traction in Hong Kong protests for its offline reliability.

Security Concerns and Impersonation Risks

Despite touting privacy, Bitchat lacks a formal security audit. Researcher Alex Radocea highlighted how easy impersonation undermines trust, noting that ‘vibe-coded’ protocols need rigorous cryptographic detail to truly protect users.

Beware of Fake Clones on Google Play

While Bitchat is officially on the iOS App Store, multiple Android apps on Google Play are posing as Dorsey’s creation. Users downloading these clones risk exposing their devices to unverified code and scams.

For organizations exploring Bluetooth mesh-based communication, balancing offline connectivity with robust security is critical. QuarkyByte’s analytical approach assesses protocol strengths, tests edge-case vulnerabilities, and guides teams to deploy resilient, user-trusted solutions.

Keep Reading

View All
The Future of Business is AI

AI Tools Built for Agencies That Move Fast.

Ready to secure your Bluetooth-based messaging solution? QuarkyByte can audit mesh network vulnerabilities, design robust identity verification layers, and simulate real-world device interactions. Ensure reliable offline communication and protect users from impersonation with QuarkyByte’s hands-on analysis and proven IoT expertise.