We Encrypt Everything
Why Encrypt Your Communications
Puts Privacy in Your Hands
A guarantee for secure communications
Are your communications private? Unless you encrypt them, the answer is no. Any message you send over the Internet passes through various servers before it reaches its destination. It could be intercepted and read at any point. This is why you need encryption to guarantee your privacy.
Encryption is the process of scrambling information into an illegible state, useless to anyone without the key to decrypt it. It guarantees that you are the only one who can access your files and read your messages.
All of Secure Group’s encrypted communication solutions work with keys owned by the user. They are generated on the user’s device and stored only there.
Secure Group believes that a backdoor for one is a backdoor for all. Unlike some providers, Secure Group does not create intentional flaws in its cryptosystem to bypass encryption.
The open source protocols used by Secure Group are subject to constant peer review. A large community of experts constantly upgrades the protocols to eliminate any room for flaws.
Zero Access to Data
We encrypt all data on the user's side with a key that only the user has. Moreover, no information ever touches Secure Group servers in an unencrypted form.
Encrypting Your Communications
Secure Group’s proprietary email client, Secure Email, uses the PGP cryptographic protocol to ensure the security of user messages. PGP provides asymmetric encryption, which secures information with a pair of keys – a public one to encrypt and a private one to decrypt data.
- 4096-bit RSA key pair used for encryption and decryption
- Public key cannot be derived from private one
- Content encrypted with IDEA cipher
- Secure Group has no access to user keys
Secure Chat is a feature-rich encrypted instant messenger providing multiple security benefits. While it features forward secrecy and deniable authentication, it does not sacrifice intuitiveness and ease of use.
- Messages encrypted with 256-bit AES cipher
- 4096-bit Diffie-Hellman used to establish secure connection
- SHA-2 hashing used for authentication
- Different keys for every chat session
- Chat messages exchanged over XMPP
Secure Voice allows users to secure their voice calls in real time. It uses the ZRTP (Z for the surname of its creator Phil Zimmerman and RTP for Real-time Transport Protocol) encryption algorithm to make voice over IP calls impossible to decipher by eavesdroppers.
- Secure connection established through Diffie-Hellman
- Short authentication string (SAS) used to detect MitM attacks
- Keys discarded after every call
- Encrypted video and group calls
Encrypting Our Network
TLS Encryption for Every Connection
We use the TLS 1.2 protocol with certificates issued by Comodo Ca Ltd. to secure the connection between our servers. We also encrypt the link between users’ devices and the two backend systems managing our services: Secure Manager and Secure Administration System.
Full Storage Encryption
Because End-to-End is Not Enough
True security calls for encrypting not just your channels of communication but your device as well. Encrypting your storage guarantees your data is secure even if you lose your phone or someone steals it. This is why we made full disc encryption an integral and mandatory feature of Secure Phone. There is no way for a user to set up his device and use it unless he encrypts it from the start.