End-to-end encrypted. Bluetooth only. Cloud free.
Three steps to seamless clipboard sync between your Mac and Android.
Download ClipRelay on your Mac and install from Google Play on Android.
Open both apps and scan the pairing QR code. Encryption keys are exchanged securely.
Copy on one device, paste on the other. It just works — no cloud, no accounts.
Built from the ground up to keep your data off the cloud and on your devices.
Copy on your Mac and it appears on your Android instantly. No buttons to press, no extra steps.
Your clipboard data never leaves the direct connection between your devices. Zero servers, zero accounts, zero tracking.
Your data travels straight from one device to the other over Bluetooth Low Energy — no WiFi or internet needed. Works anywhere, even offline.
Every transfer is encrypted with AES-256-GCM. Keys are exchanged during pairing and never leave your devices.
The Android app only requests Bluetooth Low Energy — no internet, no location, no storage access. The Mac app runs fully sandboxed with Bluetooth as its sole entitlement.
See how ClipRelay compares to other clipboard sharing solutions.
| ClipRelay | Apple Universal Clipboard Apple devices only | KDE Connect | |
|---|---|---|---|
| E2E Encryption | ✓ AES-256-GCM | ✓ | ✓ TLS |
| Dead simple setup | ✓ QR scan | ✓ | ✗ |
| Cloud free | ✓ | ✗ iCloud | ✓ |
| Works on Android | ✓ | ✗ Apple only | ✓ |
| Works on Mac | ✓ | ✓ | Good luck 🤞 |
| Connection | Bluetooth Low Energy | Bluetooth Low Energy + AWDL | WiFi (router) |
| Free | ✓ | ✓ | ✓ |
ClipRelay encrypts all data with AES-256-GCM before it ever leaves your device. Bluetooth Low Energy is just the transport — by the time anything hits the airwaves, it's already ciphertext.
This is the same design pattern used throughout the industry. Smart locks like August and Yale authenticate over BLE using their own cryptographic protocols on top. Continuous glucose monitors transmit patient health data over BLE with application-layer encryption. The principle is the same: treat BLE as a pipe, secure the contents independently.
Even in the unlikely event someone intercepts your BLE traffic, they get encrypted bytes with no way to derive the key.