Encryption done right

We take your privacy seriously. The setup of our service makes no compromise with security.

01

Secure against any threat

Maximum-size keys

Our apps use AES-256 encryption with 4096-bit RSA and DH keys for PGP and OTR, respectively.

Tried & tested protocols

We use open-source protocols that have been subject to peer review, rendering the free of flaws.

Secure implementations

Crypto Cloud’s solutions feature no backdoors and have been tested for various workarounds.

Multi-layer encryption

Our solutions use encryption for everything – device storage, app databases, and communications.

02

Pure peer-to-peer messaging

Unlike other services, we do not store user chat messages on our servers, even for a limited period. Communications happen only peer-to-peer when both parties are online, our servers just facilitate the process.

Crypto Cloud

Sender is online, recipient is offline

Message doesn’t get sent from sender’s phone.

Competitors

Sender is online, recipient is offline

Message gets sent to server and waits for recipient.

Crypto Cloud

Sender is offline, recipient is online

Message remains unsent on sender’s phone (no copy on server).

Competitors

Sender is offline, recipient is online

Message sent earlier gets sent form server to recipient.

Crypto Cloud

Sender is online, recipient is online

Message gets sent in real time from sender to recipient (P2P)

Competitors

Sender is online, recipient is online

Messages get sent through server.

03

User control over PGP keys

In PGP encryption, you use the same pair of keys for all your messages. Their security is entirely dependent on the complexity of the keys and how they are stored. Crypto Cloud gives users total control over their keys.

Crypto Cloud

Keys generated within the app on the user’s device

No keys on Crypto Cloud’s servers and no way to replicate them

User messages pass through servers but cannot be decrypted by anyone but the user – who has the keys only on their device

Competitors

Keys generated on server and then sent to user’s device

Copies of your keys can be stored or generated on the servers

The copies of your keys can be used to decrypt the messages that pass through the servers and reveal their content

Keys generated within the app on the user’s device

Keys generated on server and then sent to user’s device

No keys on Crypto Cloud’s servers and no way to replicate them

Copies of your keys can be stored or generated on the servers

User messages pass through servers but cannot be decrypted by anyone but the user – who has the keys only on their device

The copies of your keys can be used to decrypt the messages that pass through the servers and reveal their content

04

Calls that leave no trace

Voice encryption is arguably the safest cryptography available. Unlike chats and emails that leave a trail of messages behind, ZRTP-encrypted VoIP calls are encrypted soundwaves that travel over the air and disappear after they get in the recipient’s ear.

The ZRTP process

The two devices authenticate to each other and exchange encryption keys

The audio is encrypted on the sender’s side and travel in encrypted form over the air

Once received, the audio track is decrypted, played for the recipient, and then deleted

05

Secure data at rest

Mobile device security is not just about encrypting communications, the information stored on your device also needs protection. To that end, we use multiple layers of encryption.

Shared media

All your media files, logs, and notes are stored in Secure Vault – which is also always locked and encrypted unless you fill in your password.

App storage

Our email and chat apps use encrypted databases that are accessible only with a user-determined pa word. No third-party app or malware can mine data from them.

Shared media

All your media files, logs, and notes are stored in Secure Vault – which is also always locked and encrypted unless you fill in your password.

Device storage

Our Encrypted Android handset features mandatory full-disc encryption with a complex password. This prevents data extraction techniques such as chip-off.

Secure your communications

To reap the security benefits described above, you need a Crypto Cloud device – Encrypted Android, Encrypted Knox, or Encrypted BlackBerry.