Use a more personalized and identifiable way to communicate by putting your domain name at the core of your comms.
Streamline everything through one single domain-led hub, and forget juggling random logins, IDs, or phone numbers.
Keep the extra freedom and control of your Handshake domains. Plus get the added security of blockchain distribution, with decentralization making scam attacks even less likely.
You and only you can read what is sent, and nobody in between. We don’t see or hear a thing.
Connect to Thunderbolt by verifying your domain ownership, not by more hackable password logins.
Hackers must access your DNS records to attack you. If you enable DNSSEC, it’s almost impossible.
Three easy steps to get set up.
It’s easy. No payment is needed.
Connect and validate your domain to ensure the security of our account.
Done! You’re ready to make contact with whoever you like.
Stay updated to be the first to experience the app's exclusive features.
You connect your domain to Thunderbolt by verifying that you are the domain’s owner. This is done by adding custom (randomly generated by the app) TXT records to the domain’s overall DNS records. Once this is done, only the device you used to connect will be able to access Thunderbolt.
Changing your device means verifying ownership again, making it much safer than using a password. For a hacker to break into a Thunderbolt account, they need to hack the domain owner’s DNS records. A domain owner can turn on DNSSEC to help prevent this from happening.
Imagine the Domain Name System (DNS) like the Internet’s directory. It’s the system that actually finds the websites you want to visit. It exists because people use words, like website.com. But computers use numbers, like 204.120. 0.15. The DNS connects the two.
DNS records are like your business listing with the directory. They hold key information like your IP address, mail exchange, etc.
Thunderbolt, end-to-end encrypted domain communication system, allows you to connect and make calls domain to domain. Privacy and data protection are the guiding principles behind Thunderbolt and have been considered at every step to minimize personally identifiable data collected.Data Collected.
When you use Thunderbolt, we require and collect the minimum information to provide the service of domain-to-domain calling. The data collected/retained is similar to a call log and it is kept to provide you with a call log for reference.
This information is:
Thunderbolt does not share the information collected with third parties, unless we are required by law, including valid legal requests such as court orders and/or subpoenas.Public Directory Display.
When you use Thunderbolt, your domain will be searchable in a public directory on Thunderbolt. Should you choose to not provide any personal information, only the domain name is visible and is not accompanied by personal information and/or additional information that would make the domain personally identifiable.Choosing a Personal Name as a Domain.
You control the domain name that you use with Thunderbolt. Should you choose to use a domain name that matches your own name, this may or may not constitute personally identifiable information that links the domain specifically to you. Thunderbolt, as mentioned in this policy, does not add additional information and, thus, only the domain name is publicly seen.
However, if you choose to use your name within the domain used with Thunderbolt, you acknowledge and agree that this may constitute personally identifiable information. You further agree to display this domain publicly as part of Thunderbolt’s public directory. In addition, you acknowledge and agree that it will become part of a call log retained by you for your account and by the second party to any call you make and/or participate in as part of their call log.Optional Directory Information.
Thunderbolt’s public directory provides the option of adding a name and image that will be associated with your domain name. These fields are optional. You may choose to provide your actual name and/or image or you can choose to use non-personally identifiable information such as a pseudonym and avatar.