The Short Version

No Accounts

Bridgelink does not require you to create an account, provide an email address, phone number, or any other identifying information. You choose your own display name ‐ it never leaves your device to any server.

No Servers

Your messages, contacts, and encryption keys are stored exclusively on your device. There are no Bridgelink servers, no cloud storage, and no centralised infrastructure that could be breached, subpoenaed, or surveilled.

No Tracking

Bridgelink contains no analytics, no telemetry, no advertising SDKs, and no third-party tracking of any kind. Your usage patterns, message frequency, and contacts are entirely private.

No Data Sales

Bridgelink does not sell, rent, trade, or otherwise share any data with third parties ‐ because there is no data to share. We have no access to your messages, your contacts, or your identity.

What Data Is Handled & How

Messages are stored locally in an encrypted database on your device. They are transmitted directly between devices using WiFi Aware ‐ either directly to the recipient or relayed through other Bridgelink devices in the mesh. All messages are end-to-end encrypted using ECDH key exchange before transmission. Relay nodes that carry your messages cannot read them. No messages are sent to or stored on any external server.

Contacts are stored locally on your device. Bridgelink does not access your phone's system contacts. Contacts are added manually through the in-app pairing process, which requires both parties to be physically nearby and to verify a 6-digit PIN. Contact data never leaves your device to any server.

Android requires the Location permission to be granted before an app can use WiFi Aware or scan for nearby WiFi devices. Bridgelink uses this permission solely to enable peer discovery through WiFi Aware. Bridgelink does not read, record, store, or transmit your GPS coordinates or physical location at any point. Your location is never determined, stored, or shared by Bridgelink.

The camera permission is used exclusively for the optional Intruder Detection feature. When this feature is enabled, a silent front-camera photo is taken after a configurable number of failed unlock attempts. These photos are stored locally on your device only, with a maximum of 50 photos (older ones are automatically deleted). Photos are never transmitted anywhere. The feature is opt-in and can be disabled at any time in Settings.

Bridgelink supports optional fingerprint and biometric authentication as an app lock method. Biometric data is processed entirely by the Android operating system and the device's secure hardware (TEE/StrongBox). Bridgelink never has access to your actual biometric data ‐ it only receives a pass/fail result from the system. Your fingerprint or face data is never stored or transmitted by Bridgelink.

During the pairing process, each device advertises a randomly generated 3-word name (e.g., "apple-bridge-cloud") from a 2048-word list. This temporary name is used only for the duration of the pairing session and has no persistent link to your identity. Your chosen display name is only revealed after mutual PIN verification. No persistent device identifiers (such as IMEI or MAC address) are exposed to other users.

Your cryptographic identity keys are generated on your device and stored locally, encrypted using AES-256-GCM via the Android Keystore. The master encryption key never leaves the device's secure hardware. Your identity keys are never uploaded to any server. If you use the backup feature, your keys are included in an encrypted backup file stored to a location of your choosing (such as local storage or a file sharing app) ‐ Bridgelink does not upload backups anywhere automatically.

Why We Request Each Permission

Required by Android to use WiFi Aware and scan for nearby WiFi devices. This is an Android OS requirement ‐ without it, WiFi Aware peer discovery cannot function. Bridgelink does not read or store your GPS location. These permissions are used solely to allow the WiFi Aware subsystem to operate. We also set the manifest option in the app to android:usesPermissionFlags="neverForLocation". This flag tells Android "we don't derive GPS coordinates from WiFi.

WiFi Aware does require Precise location permission over the Approximate or Coarse location permission to work though, otherwise we would only request Coarse permissions. If at any time Android changes this requirement, we will update the app to only request approximate.

Required to read and configure WiFi state for the WiFi Aware mesh network. These permissions allow Bridgelink to interact with the WiFi Aware subsystem on your device.

Required on Android 13+ for WiFi Aware peer discovery. This permission allows Bridgelink to discover and communicate with nearby devices running Bridgelink. We also set the manifest option in the app to android:usesPermissionFlags="neverForLocation". This flag tells Android "we don't derive GPS coordinates from WiFi.

Used only for the optional Intruder Detection feature, which silently photographs failed unlock attempts using the front camera. This feature is off by default and must be manually enabled. Photos are stored locally only. This permission is only requested when you turn on that feature, it is off by default.

Used for the optional biometric app lock feature. Bridgelink never processes biometric data directly ‐ authentication is handled entirely by Android and the device's secure hardware.

Required to run the mesh relay service in the background. When Bridgelink acts as a relay node, it runs as a foreground service (displaying a persistent notification) so Android does not kill the process. This keeps the mesh operational when the app is in the background.

Required to keep the relay service running reliably in the background without Android's battery optimisation system interrupting it. Without these, message relaying would stop working when the screen turns off. You can revoke this at any time in Android Settings > Battery > Bridgelink.

Required to display notifications for new incoming messages and to show the persistent relay service notification. Notification content can be hidden (sender name and message preview suppressed) in Settings for additional privacy.

Allows Bridgelink to restart the relay service automatically when your device boots, so you do not need to manually open the app to resume receiving messages via the mesh.

Used to schedule precise timing for relay service operations and overnight relay hub monitoring. This ensures messages can be relayed reliably on a consistent schedule.

Voluntary Bug Reporting

Bug reports are submitted voluntarily through the Bug Report page on this website ‐ not from within the app itself. The app makes no internet connections and sends nothing automatically. If you choose to submit a report, it is an entirely manual action you take on the website.

A bug report may include: your device model and Android version, the Bridgelink app version, a description of the issue you provide, and any diagnostic log data you choose to include. Reports do not include your messages, contact list, display name, encryption keys, or any personal communication data.

Bug reports do not require any identifying information. You may optionally provide an email address if you would like a follow-up response, but this is entirely at your discretion. If no email is provided, the report is anonymous.

Bug report data is stored securely and used solely for the purpose of identifying and fixing issues with the application. It is not shared with third parties, sold, or used for any purpose other than improving Bridgelink.

Third-Party Sharing & Services

Bridgelink is distributed through the Google Play Store. Google's own privacy practices apply to the installation and update process, as they do with all Play Store apps. Bridgelink itself does not use Google Play Services APIs (such as Firebase, AdMob, or Google Analytics). For information on Google's data practices, refer to Google's Privacy Policy.

Children's Privacy

Bridgelink includes automatic detection of suspicious usernames and group names. If a username or group name appears to contain advertising-style content, the app flags it with a visible warning before the user proceeds. The user must explicitly acknowledge the warning and confirm in person before accepting. This directly prevents the "billboard" attack pattern where a bad actor advertises to unsuspecting nearby users.

Group messages from people who are not in your contacts are handled carefully. Unknown senders are displayed only as an anonymised identifier (a truncated cryptographic hash) rather than any name they have given themselves ‐ so they cannot self-identify as someone you trust. Crucially, their messages are not shown to you at all: because you have never exchanged encryption keys with them, the app has no way to decrypt their content, and nothing is displayed.

To read messages from any group member you have not yet met, you must add them as a contact in the normal way ‐ meeting in person, within physical proximity, and completing the same mutual key exchange and PIN verification used for individual contacts. Only after that exchange does the app hold the keys needed to decrypt their messages, and only then can you read their messages.

Messages from unknown senders are also rate-limited: no single unknown sender can send more than 25 messages to you in a 24-hour period, and the combined total from all unknown senders is capped. Any group member can additionally be ignored, hiding any future messages from them without notifying them.

Bridgelink includes a full app lock system. The app can be locked with a PIN (hashed using PBKDF2-SHA256 with 100,000 iterations), fingerprint or face biometric, a time-based authenticator code (TOTP), or any combination of these as two-factor authentication. Failed unlock attempts trigger escalating lockouts and, if enabled, a silent front-camera photograph of whoever is attempting access. A separate duress PIN can be set: entering it on the lock screen immediately and silently wipes all messages, contacts, and encryption keys, leaving the app appearing empty rather than alerting the person coercing access.

All contacts and messages are stored locally on the device. A parent or guardian with access to the device can review contacts and message history directly in the app. Because everything is local and there is no external account, there is no separate parental dashboard or remote management capability ‐ control is exercised through access to the device itself. The app lock feature means the device owner can also restrict access to the app with a PIN or biometric.

Changes to This Policy

This policy may be updated to reflect changes to the application or applicable law. Any changes will be posted on this page with an updated date. We will not introduce data collection practices without clearly disclosing them here. Your continued use of Bridgelink after any changes constitutes acceptance of the updated policy.

For privacy-related questions or concerns, you can contact us at . We will respond on a best-effort basis.

This privacy policy was last updated on 2nd March 2026.