A guarantee for private and secure communications
Encryption is the process of scrambling information into an illegible state, useless to anyone without the key to decrypt it. It guarantees that you are the only one who can access your files and read your messages.
All of Secure Group’s encrypted communication solutions work with keys owned by the user. They are generated on the user’s device and stored only there.
Secure Group believes that a backdoor for one is a backdoor for all. Unlike some providers, Secure Group does not create intentional flaws in its cryptosystem to bypass encryption.
The open-source protocols used by Secure Group are subject to constant peer review. A large community of experts constantly upgrades the protocols to eliminate any room for flaws.
Zero-access to data
We encrypt all data on the user’s side with a key that only the user has. Moreover, our decentralized network is designed around the concept of zero-knowledge, and no sensitive data is stored outside the communication devices.
Your data, secured by multiple layers of encryption
All incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted and decentralized network. All data stored on devices is secured and encrypted.
The process of encrypting your communications starts even before you send your first message with the generation of a cryptographic key or key pair. No matter the communication channel you’ve chosen -chat, call, email- encryption keys are generated on the device, and private keys are never stored outside it.
When you type in your message and press the send button, your message is instantly encrypted with the device-generated encryption keys. Our products are secured by open-source encryption protocols, which have been vetted numerous times and have never been compromised.
Secure key exchange
Once your message is encrypted and on its way to the recipient, a secure key exchange occurs. Our products rely on the proven Diffie-Hellman key exchange algorithm, a method for securely exchanging cryptographic keys over a public communications channel.
This is an additional step available in peer-to-peer chats and voice calls, designed to detect and counter man in the middle (MITM) attacks. It involves the two communicating parties sharing a common secret, thus verifying their identities and the security of the communication channel.
Data in transit
TLS encrypted network
Your messages travel through our decentralized secure communication network in an encrypted form. The connection between different Encrypted Communication Nodes (ECNs) is secured using the TLS 1.2 protocol with certificates issued by Comodo Ca Ltd.
Data at rest
Secure device storage
True security calls for encrypting not just your channels of communication but your device as well. Encrypting your storage guarantees your data is secure even if you lose your phone or someone steals it. This is why we made storage encryption and triple password protection integral and mandatory features of all our devices.