Getting Started
Protect your network in 5 minutes. No hardware required.
1 Create Your Account
Sign up at chichacybersecurity.com/login with your email or Google account. Your 7-day free trial starts immediately — no credit card required.
2 Install the Agent
The agent is a small download that monitors your network. It runs silently in the background and checks all traffic against known threats.
Available for macOS, Windows, and Linux. One download, runs in the background.
macOS · Windows · Linux
Other install options: command line
Linux (command line)
# Download, make executable, and run
curl -sSL https://chichacybersecurity.com/downloads/chichacybersecurity-linux-x64 -o chichacybersecurity
chmod +x chichacybersecurity
./chichacybersecurity
A browser window opens for one-click authorization. The agent starts monitoring immediately.
The agent opens your browser for one-click authorization — no codes needed. Your files, photos, and messages never leave your devices — the agent only reports security events (like a new program starting or a suspicious login).
3 See Your Dashboard
Within minutes, your dashboard shows all devices on your network, active connections, and any security alerts. Ask questions in plain English:
- "Is my network safe right now?"
- "What devices are on my network?"
- "Show me anything suspicious from last night"
How It Works
What the agent monitors
The agent scans your local network every 60 seconds:
- Devices — discovers every device (phones, laptops, smart TVs, IoT)
- Connections — tracks who's talking to whom and on what ports
- Threats — matches connections against known malicious IPs, domains, and URLs from comprehensive threat intelligence feeds that update automatically
- Anomalies — flags unusual activity that may indicate unauthorized access
What happens when a threat is found
If the agent detects a connection to a known malicious IP or domain:
- An alert is created instantly (no AI query used)
- The alert appears in your dashboard within 5 minutes
- You get an email notification (if enabled)
- You can ask the AI to investigate: "Tell me about this threat" (uses 1 AI investigation)
Your privacy
- Your files, photos, and messages never leave your devices. The agent reports security events — who logged in, what programs started, unusual network connections — not the contents of anything.
- All communication is encrypted (HTTPS/TLS)
- Your account's data is isolated to your account — other customers never see it
- Your device token is stored securely (macOS Keychain or restricted-permission file)
- You can delete all your data at any time from the dashboard
What the App Does
On each computer you install it on
- Watches for suspicious programs — background mining, remote-control shells, unusual behavior
- Protects critical system files from tampering
- Detects ransomware in progress — our traps go off before your files are locked
- Catches password-guessing attacks on your login
- Notices when something on your computer tries to quietly call out to an attacker
- Spots suspicious web lookups and hidden data transfers
- Notices when your computer is acting out of character
On Macs specifically
- Catches apps trying to sneak past Apple’s built-in safeguards
- Notices when an app tries to grab your camera, microphone, screen, or files without permission
- Uses Apple’s own deep-access security layer for the highest visibility Apple allows any security product to have
For every other device on your network
- Inventories every device connected to your Wi-Fi — phones, laptops, smart TVs, gadgets
- Alerts you when a new, unknown device appears on your network
- Scans unknown devices for risky exposed services (unprotected databases, open admin ports)
Most home Wi-Fi is switched, which means the app on one computer can’t passively read traffic from other devices on the same Wi-Fi. So to actually monitor traffic, processes, or file changes on another device — install the app on that device. The network-discovery layer tells you what’s there and what’s risky about it; installing directly adds the watching. See how many devices each plan covers.
FAQ
What operating systems does the agent support?
Windows (.exe installer), macOS (.dmg), and Linux (binary). All three platforms are fully supported with native installers.
Does the agent slow down my network?
No. It uses minimal RAM and less than 1% CPU. It passively reads network connections — it doesn't intercept or modify your traffic.
What's the difference between automated alerts and AI investigations?
Automated alerts happen whenever the agent detects a known threat — unlimited, included in all plans. AI investigations are when YOU ask a question in plain English and the AI analyzes your data — limited per plan (1,000 / 2,500 / 10,000 per month for Home / Plus / Business).
How do I uninstall?
macOS: Move ChichaCybersecurity from Applications to Trash.
Windows: Uninstall from Settings > Apps.
Linux: Run this in your terminal:
systemctl --user stop chichacybersecurity && systemctl --user disable chichacybersecurity && rm ~/.config/systemd/user/chichacybersecurity.service
Or simply delete the application file you downloaded.
What happens after my 7-day trial?
Your trial includes full Home features. After 7 days, subscribe to Home ($9.99/mo) to keep AI investigations and alert history. If you don't subscribe, monitoring stops.
How much cheaper is this than CrowdStrike, Defender, or SentinelOne?
Take a household with five computers for a year: Chicha Home is $120/year total (one network, covers the 5 computers plus every phone, smart TV, and gadget on your Wi-Fi). CrowdStrike Falcon Go is $59.99/device/year with a 5-device minimum = $300/year. Microsoft Defender for Endpoint Plan 2 is $5.20/user/month = $312/year for five. SentinelOne Singularity is quote-only, typically $8–15/device/month per industry reporting = $480–900/year for five. At 25 computers the gap widens: Chicha Plus is $240/year, the others are $1,500–4,500/year. See the full comparison.
Why is it so much cheaper?
Three reasons. Per-network pricing instead of per-device means one price covers your whole home or small office. Chicha AI does the threat-hunting work that other vendors charge a 24/7 human analyst team to do. And no enterprise sales reps, paid pilots, or lengthy procurement — you sign up from the website for $9.99 and start using it in minutes.
So what do CrowdStrike and the others do that Chicha doesn’t?
A few things that matter at large corporate scale: 24/7 human security analyst teams on call, managed threat response, integration with MDM/identity platforms at thousands of seats, and enterprise support contracts with response-time guarantees. If you’re protecting a 1,000-employee company with a compliance team, that’s what you’re paying for. If you’re protecting a household, a small office, or a small business, almost none of that applies to you — and you’re paying for it anyway.
Does Chicha block threats, or just detect them?
Mostly detect & alert. We watch, we catch, we tell you. On Macs we can also actively block known-bad programs from launching, using Apple’s own deep-access security layer. On Windows and Linux, we tell you what we’ve seen and suggest what to do — we don’t quietly make changes to your system without your knowledge.
What data leaves my device?
Security-relevant events go to our cloud so the AI can help you investigate and so we can connect patterns across your devices — things like which programs are running, which websites are being contacted, and login activity. We do not send your documents, photos, browsing history, keystrokes, or screenshots. For community defense, only anonymized fingerprints of threats are shared, never any data that could identify you or another customer. You can delete all your data from the dashboard at any time.