A guarantee for private and secure communications
Encryption is the process of scrambling information into an illegible state, useless to anyone without the key to decrypt it. It guarantees that you are the only one who can access your files and read your messages.
User-owned keys
All of Secure Group’s encrypted communication solutions work with keys owned by the user. They are generated on the user’s device and stored only there.
No backdoors
Secure Group believes that a backdoor for one is a backdoor for all. Unlike some providers, Secure Group does not create intentional flaws in its cryptosystem to bypass encryption.
Open-source
The open-source protocols used by Secure Group are subject to constant peer review. A large community of experts constantly upgrades the protocols to eliminate any room for flaws.
Zero-access to data
We encrypt all data on the user’s side with a key that only the user has. Moreover, our decentralized network is designed around the concept of zero-knowledge, and no sensitive data is stored outside the communication devices.
Your data, secured by multiple layers of encryption
All incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted and decentralized network. All data stored on devices is secured and encrypted.
Data encryption
Key generation
Message encryption
Secure key exchange
Session verification
Data in transit
TLS encrypted network
Your messages travel through our decentralized secure communication network in an encrypted form. The connection between different Encrypted Communication Nodes (ECNs) is secured using the TLS 1.2 protocol with certificates issued by Comodo Ca Ltd.
Data at rest
Secure device storage
True security calls for encrypting not just your channels of communication but your device as well. Encrypting your storage guarantees your data is secure even if you lose your phone or someone steals it. This is why we made storage encryption and triple password protection integral and mandatory features of all our devices.