The application uses distributed hash tables (DHT) to establish communications. This technology eliminates the use of centralized registers and the retention of personal data. Jami is based on a distributed network technology, allowing it to not use servers that require dependency and that facilitate mass surveillance.
Jami stores your secrets (private keys for encryption and identity) only on the machine that executes it, which belongs to you. Your device is therefore the sole holder of your information.