Encryption done right

We take your privacy seriously. The setup of our service makes no compromise with security.

crypto-cloud-technology
encryption icon

Secure against any threat

Unlike other services, we do not store user chat messages on our servers, even for a limited period. Communications happen only peer-to-peer when both parties are online, our servers just facilitate the process.

peer to peer icon

Pure peer-to-peer messaging

Unlike other services, we do not store user chat messages on our servers, even for a limited period. Communications happen only peer-to-peer when both parties are online, our servers just facilitate the process.

1. Sender is online, recipient is offline

Message doesn’t get sent from sender’s phone.

2. Sender is offline, recipient is online

Message remains unsent on sender's phone (no copy on server).

3. Sender is online, recipient is online

Messages get sent in real time from sender to recipient (P2P).

user managed keys icon

User control over PGP keys

In PGP encryption, you use the same pair of keys for all your messages. Their security is entirely dependent on the complexity of the keys and how they are stored. Crypto Cloud gives users total control over their keys.

1. Keys generated within the app on the user's device.

2. No keys on Crypto Cloud's servers and no way to replicate them.

3. User messages pass through servers but cannot be decrypted by anyone but the user - who has the keys only on their device.

zero knowledge icon

Calls that leave no trace

Voice encryption is arguably the safest cryptography available. Unlike chats and emails that leave a trail of messages behind, ZRTP-encrypted VoIP calls are encrypted soundwaves that travel over the air and disappear after they get in the recipient’s ear.

The ZRTP process

  • The two devices authenticate to each other and exchange encryption keys.
  • The audio is encrypted on the sender’s side and travel in encrypted form over the air
  • Once received, the audio track is decrypted, played for the recipient, and then deleted
secure data icon

Secure data at rest

Mobile device security is not just about encrypting communications, the information stored on your device also needs protection. To that end, we use multiple layers of encryption.

Secure your communications

To reap the security benefits described above, you need a Crypto Cloud device – Encrypted Android, Encrypted Knox, or Encrypted BlackBerry.