One of the main advantages of Secure Group’s encrypted mobile communications solutions is that they allow you to talk privately to anyone, from virtually anywhere. To boost the availability of our services even further, we have expanded our data coverage to include 20 more countries.
How safe is the data stored on your smartphone? Depends on the capabilities of the adversaries you face. If you work in a high-stakes industry, the adversaries you face could be sophisticated enough to perform chip-off on your device if they get a hold of it and access all data it stores. How does Secure Group protect you from that?
Secure Group’s partner network continues to expand. Today, we are proud to announce the launch of the websites of two companies that recently joined our ranks: Secure Com World and Secret Holder. You can check out their region-specific offerings and submit any inquiries directly to them.
The next frontier in the fight to regain privacy online is about the security of data at rest. End-to-end encryption does a great job at securing communications, but contemporary attacks find ways around it by targeting unencrypted app databases and storages. This is why we created Secure Vault – an encrypted container app to store all your notes and files.
We have written about the almost infinite possibilities for surveillance and malicious activity presented by flaws in the Signaling System 7 (SS7) protocol used by virtually all mobile networks worldwide. A security research firm recently demonstrated how the same exploit can be used to drain a Bitcoin wallet. Which certainly drives home the point about how easy subverting (otherwise reliable) security systems can be.
Last week, a report by Mathy Vanhoef of imec-DistriNet revealed a vulnerability in the WPA2 protocol used by virtually all Wi-Fi networks worldwide. The flaw allows hackers to perform a man-in-the-middle (MitM) attack and decrypt and read all Internet traffic going through the network. However, Secure Phone users should rest assured that their security is not compromised.
Secure Group is excited to announce it is expanding its presence in Africa. We are partnering with South Africa-based Secure Com World as a distributor of our products and services in most of the continent.
If you care about your privacy, you need to use apps that provide end-to-end encryption for your communications. Providing this kind of security for group chats is a technical challenge. The OMEMO extension for XMPP, which Secure Chat also uses, solves this challenge with the Double Ratchet Algorithm. Here is how it works.
If you are looking for ways to secure your privacy online, you should know by now that the first step is to use encryption for everything. Yet, cryptography is not exactly the most popular or easily digestible of sciences. It could be hard to make sense of all the protocol and algorithm names flying around.
We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.