Preservation of users privacy is an ongoing activity. As hackers and crackers learn or apply new methods to invade users privacy so is the work of security expert to constantly device counter measures to secure users sensitive information from being leaked. Is an unending duty of security expert. This work addressed various ways to achieve this and proposes a matchmaking protocol to enable users communicate in a secured environment without being eaverdropped. The distributed architecture was used to implement the scheme as users show little or not interest in compromise.