Pug Network logo Pug Network

Private 1-on-1 rooms with ephemeral chats. Solve the quick entry puzzle to step inside.

Quick check before you enter

Slide all the way to start the puzzle.

Fetching entry puzzle…

Pug Network logo Pug Network
Docs Free to use

Pug Network - free, account-less, encrypted chat rooms

Launch encrypted express rooms for two or tailor custom links with expiry and caps—no sign-up ever.

  • Express rooms for two: share the link and start privately in seconds.
  • Self-destructing timers: choose when chats vanish—5 minutes to 24 hours.
  • True end-to-end encryption: only invited guests hold the key.
  • Custom rooms: add participant limits and room controls for secure groups.
Build a custom room

Custom room options with encrypted links and participant caps—100% free.

Link to Express Room

The #… at the end of the link contains the AES key and the room secret. Both stay in your browser — our server never receives them. Share the full link only with people you trust.

How to use your private room

  1. Choose your setup: Click Create Express Room for a two-person link, or Build a custom room to preset expiry and participant cap before sharing.
  2. Share with your guests: Copy the link and send it directly. Express rooms support you and one guest; custom rooms follow the limit you picked.
  3. Stay encrypted: Keep the # fragment in the link so only invited people can read the conversation.
  4. Purge or let it expire: Use the Purge button to clear history early, and every room auto-vanishes on the schedule you choose.

Create a custom room

Set the expiry and participant cap.

Fine-tune the room before sharing the link.

Technical note: why Pug Network stays secure

  • Client-side encryption: the AES-GCM key is generated in your browser and shared only inside the link’s # fragment, so our servers relay ciphertext without ever seeing the key.
  • Ephemeral rooms: sessions live in memory, auto-expire on schedule, and purge everyone instantly when the timer ends—nothing rests on disk.
  • Abuse-resistant access: a lightweight proof-of-work check keeps bots from mass-creating rooms while letting humans stay anonymous and account-free.
  • No file transfers: by design we skip uploads to remove a major attack path and keep conversations focused on secure text only.