Enterprise

Your infrastructure.
Your rules.
Zero exposure.

Self-hosted Texrr on your infrastructure. Air-gapped deployment. Bulk QR provisioning. No data ever leaves your network. Nothing to subpoena, nothing to breach, nothing to compromise.

Enterprise vs Consumer

Same security. Your infrastructure.

The consumer app uses Texrr-hosted Supabase for auth and signaling. Enterprise replaces that with your own servers. The cryptography, binaries, and P2P messaging are identical.

Consumer App
Texrr-hosted auth (Supabase Cloud)
Texrr-hosted signaling server
Public STUN servers
App Store / Play Store distribution
$4.99/year or $29.99 lifetime per user
Email support
Enterprise
Self-hosted auth (Supabase on your servers)
Self-hosted signaling server
Self-hosted STUN/TURN (coturn on your network)
MDM / sideload / enterprise app distribution
Annual contract, per-seat pricing
Dedicated support with SLA
What never changes: AES-256 encryption on device · WebRTC P2P messaging · QR-only contact exchange · Hash chain verification · Merkle proofs · Five auditable Go binaries · No message storage anywhere · No recovery
Deployment

Three deployment models.

Private Cloud

Deploy on your cloud provider. AWS, Azure, GCP, or any infrastructure you control. Full Supabase stack, signaling server, and STUN/TURN on your VPC.

Your cloud, your region, your compliance
Docker Compose deployment
Standard enterprise networking

On-Premise

Run everything on physical hardware in your data centre. No external network dependencies for auth, signaling, or NAT traversal. Complete physical control.

Most popular for government
Bare metal or VM deployment
No internet dependency for internal comms

Air-Gapped

Fully isolated network. No internet connection. Auth, signaling, and TURN all run on internal infrastructure. Devices communicate via internal network WebRTC only.

Defence and classified environments
Zero external network traffic
USB-based binary distribution
Enterprise Features

Built for scale and control.

Bulk QR Provisioning

Generate QR codes for your entire team from an admin console. Pre-configure contact groups so employees can message each other from day one without manual scanning.

Admin Dashboard

User provisioning, deactivation, and public key management. View verification status across your organisation. No message content is ever visible — admin controls account-level operations only.

MDM Distribution

Distribute the Texrr app via Mobile Device Management — Jamf, Intune, Workspace ONE, or your MDM of choice. Pre-configure server endpoints and push binaries alongside the app.

Custom Inbox Categories

Pre-configure inbox tabs for your organisation — Ops, Legal, Executive, Field — whatever fits your structure. Users see messages sorted by category from the start.

Verification Reports

Export hash chain verification summaries for compliance. Reports confirm that cryptographic integrity checks passed across your user base — without exposing any message content.

SLA Support

Dedicated support engineer. Guaranteed response times. Deployment assistance, infrastructure review, and ongoing consultation. Priority issue resolution.

Architecture

What you host. What you don't.

Your Infrastructure
Supabase
Auth + user table
PostgreSQL + GoTrue
Signaling
WebRTC handshake
Supabase Realtime
STUN / TURN
NAT traversal
coturn on your network
Admin Console
User management
QR provisioning
User Devices (on each device)
LayerOneL
AES-256
ledger-memo
Hash chains
MerkleProof
Merkle trees
texrr-msg
Message queue
verify-user
Chain verify
All five binaries run on-device. Stateless. Independently auditable. Nothing leaves the device except encrypted payloads via WebRTC P2P.
Does not exist anywhere
Message storage · Message relay · Content logs · Private keys · Encryption nonces · User directory · Contact search · Backups
Use Cases

Who deploys Texrr Enterprise.

Government & Defence

Classified communications on air-gapped networks. Chain of custody via hash chains. Zero external data exposure. USB-distributed binaries for secure environments.

Air-gapped · On-premise · USB distribution
Healthcare

HIPAA-aligned messaging — no patient data on any server. Clinician-to-clinician device-to-device communication. Verification flags catch account compromise before sensitive information is exposed.

Private cloud · MDM distribution · Compliance reports
Legal & Financial

Attorney-client privilege that's actually enforced by cryptography. Trade secrets that exist only on the devices of participants. Hash chain audit trails for compliance without content exposure.

Private cloud · Verification reports · Per-seat licensing
Executive Communications

Board-level discussions that never pass through a server. M&A negotiations, strategic planning, competitive intelligence — each message individually encrypted and delivered P2P. No persistent threads to leak.

Private cloud or on-premise · Bulk QR provisioning
Compliance

The easiest compliance audit you'll ever do.

GDPR

We hold email, username, and public key. No message data to regulate. Account deletion removes all server-side data. Data processing agreement available.

HIPAA

No protected health information on any server. Device-to-device transmission with AES-256 encryption. Self-hosted deployment eliminates BAA requirements for message content — there is no message content to cover.

SOC 2

Self-hosted deployment means your SOC 2 scope covers your infrastructure, not ours. The attack surface is two database columns and a public key. Audit the five Go binaries independently.

Subpoena

Consumer: we produce email, username, public key. That's everything we have. Enterprise self-hosted: the subpoena goes to you, and you hold email, username, public key. Message content does not exist on any server.

Pricing

Simple, transparent pricing.

Consumer
$4.99 /year or $29.99 lifetime

Full encryption and P2P messaging

Hash chain verification

QR contact exchange

4 themes

Email support

Enterprise
Custom per-seat, annual contract

Everything in Consumer, plus:

Self-hosted infrastructure

Bulk QR provisioning

Admin dashboard

MDM distribution

Verification reports

Custom inbox categories

Dedicated support with SLA

Deployment assistance

Get started

Request a demo.

Tell us about your organisation, deployment requirements, and user count. We'll schedule a technical walkthrough and provide a tailored proposal.

We respond within 24 hours. Technical demos available for qualified organisations.