We Encrypt Everything

Why Encrypt Your Communications

Encryption
Puts Privacy in Your Hands

A guarantee for secure communications

Are your communications private? Unless you encrypt them, the answer is no. Any message you send over the Internet passes through various servers before it reaches its destination. It could be intercepted and read at any point. This is why you need encryption to guarantee your privacy.

Encryption is the process of scrambling information into an illegible state, useless to anyone without the key to decrypt it. It guarantees that you are the only one who can access your files and read your messages.

Encription

User-Owned Keys

All of Secure Group’s encrypted communication solutions work with keys owned by the user. They are generated on the user’s device and stored only there.

No Backdoors

Secure Group believes that a backdoor for one is a backdoor for all. Unlike some providers, Secure Group does not create intentional flaws in its cryptosystem to bypass encryption.

Open Source

The open source protocols used by Secure Group are subject to constant peer review. A large community of experts constantly upgrades the protocols to eliminate any room for flaws.

Zero Access to Data

We encrypt all data on the user's side with a key that only the user has. Moreover, no information ever touches Secure Group servers in an unencrypted form.

End-to-End Encryption

Encrypting Your Communications

SECURE EMAIL with PGP Protocol

VIEW PROTOCOL

Secure Group’s proprietary email client, Secure Email, uses the PGP cryptographic protocol to ensure the security of user messages. PGP provides asymmetric encryption, which secures information with a pair of keys – a public one to encrypt and a private one to decrypt data.

  • 4096-bit RSA key pair used for encryption and decryption
  • Public key cannot be derived from private one
  • Content encrypted with IDEA cipher
  • Secure Group has no access to user keys

4096 bit

Key Size

SECURE CHAT with OTR Protocol

VIEW PROTOCOL

Secure Chat is a feature-rich encrypted instant messenger providing multiple security benefits. While it features forward secrecy and deniable authentication, it does not sacrifice intuitiveness and ease of use.

  • Messages encrypted with 256-bit AES cipher
  • 4096-bit Diffie-Hellman used to establish secure connection
  • SHA-2 hashing used for authentication
  • Different keys for every chat session
  • Chat messages exchanged over XMPP

AES-256

Encryption

SECURE VOICE with ZRTP Protocol

VIEW PROTOCOL

Secure Voice allows users to secure their voice calls in real time. It uses the ZRTP (Z for the surname of its creator Phil Zimmerman and RTP for Real-time Transport Protocol) encryption algorithm to make voice over IP calls impossible to decipher by eavesdroppers.

  • Secure connection established through Diffie-Hellman
  • Short authentication string (SAS) used to detect MitM attacks
  • Keys discarded after every call
  • Encrypted video and group calls

SHA-2

Hash Function

Try Our Apps Now

Start securing your communications today. Secure Email, Secure Chat, and Secure Voice are available for download on Google Play.

Try our apps

Network Security

Encrypting Our Network

Securing Network

TLS Encryption for Every Connection

We use the TLS 1.2 protocol with certificates issued by Comodo Ca Ltd. to secure the connection between our servers. We also encrypt the link between users’ devices and the two backend systems managing our services: Secure Manager and Secure Administration System.

process-chart-a-desktop
  • TLS Certificate Request When a device connects to one of Secure Group’s servers, it requests a copy of the server’s TLS certificate. The server sends it together with its public 256-bit RSA key.
  • Certificate Check The device checks whether the certificate comes from a legitimate authority (like Comodo) and that it hasn’t expired.
  • Generating AES Session Key The device generates a 256-bit symmetric AES session key, which it encrypts with the server’s public key, and sends it to the server.

Ongoing Session

  • Key Decryption
  • AES-256bit Encrypted Connection
  • Traffic Flow
  • The server decrypts the device’s session key with its secret private key. After this a TLS session is established and the traffic during the session is encrypted with the AES key.
  • End of Sesison At the end of the session, the session key is discarded. A new key is created for each session.

Storage Encryption

Full Storage Encryption
Because End-to-End is Not Enough

True security calls for encrypting not just your channels of communication but your device as well. Encrypting your storage guarantees your data is secure even if you lose your phone or someone steals it. This is why we made full disc encryption an integral and mandatory feature of Secure Phone. There is no way for a user to set up his device and use it unless he encrypts it from the start.

Download white paper
Storage Encryption