<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

OMEMO end-to-end encryption for chat explained

[fa icon="calendar'] Oct 9, 2017 10:06:35 AM / by Stefan Topuzov

If you care about your privacy, you need to use apps that provide end-to-end encryption for your communications. Providing this kind of security for group chats is a technical challenge. The OMEMO extension for XMPP, which Secure Chat also uses, solves this challenge with the Double Ratchet Algorithm. Here is how it works.

Read More ...

[fa icon="comment"] 0 Comments

How to make sense of encryption protocols

[fa icon="calendar'] Sep 25, 2017 10:35:30 AM / by Stefan Topuzov

If you are looking for ways to secure your privacy online, you should know by now that the first step is to use encryption for everything. Yet, cryptography is not exactly the most popular or easily digestible of sciences. It could be hard to make sense of all the protocol and algorithm names flying around.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 9:50:02 AM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

Why online privacy matters – and how to take it back

[fa icon="calendar'] May 15, 2017 10:38:41 AM / by Stefan Topuzov

Privacy is a fundamental human right. Everyone is entitled to their own domain – property, thoughts, identity, secrets, etc. – everything that defines one’s self. The concept of privacy is one of the cornerstones of modern civilization. Then why do people brush off as unimportant most efforts to safeguard privacy in the online world?

Read More ...

[fa icon="comment"] 0 Comments

6 encryption workarounds (that don’t work on our products)

[fa icon="calendar'] May 1, 2017 9:15:06 AM / by Stefan Topuzov

Contemporary encryption is practically unbreakable. Because of that, attackers don’t bother breaking it but look for ways to bypass it and still access users’ data. Whether these workarounds work or not, comes down to the implementation of encryption algorithms. Here’s what the methods are and why they wouldn’t work against Secure Group’s products.

Read More ...

[fa icon="comment"] 0 Comments

How being 100% P2P helps Secure Chat guarantee its users' privacy

[fa icon="calendar'] Apr 3, 2017 11:39:18 AM / by Stefan Topuzov

All chat apps rely on servers over which end users have no control. How do you guarantee the user's privacy then? For our proprietary IM client, Secure Chat, we have done it by making the app a pure peer-to-peer (P2P) encrypted chat client and by limiting the role of the servers to just facilitating the communication.

Read More ...

[fa icon="comment"] 0 Comments

Device encryption and remote wipe: How Secure Phone keeps your data safe

[fa icon="calendar'] Mar 28, 2017 7:18:14 AM / by Stefan Topuzov

Encrypting your communications guarantees anyone who intercepts them will not be able to read your messages. But what about the data that stays on your device? Chat histories, contacts, stored files, etc. – all possibly sensitive information. This is where device encryption and remote wipe come in to protect your stored data. 

Read More ...

[fa icon="comment"] 0 Comments

Secure Group doesn’t store user encryption keys. Here’s why

[fa icon="calendar'] Mar 21, 2017 9:43:17 AM / by Stefan Topuzov

When it comes to protecting our users’ privacy, Secure Group makes no compromises. All our communication solutions provide end-to-end encryption with keys that are generated on the users’ devices and stored only there.

Read More ...

[fa icon="comment"] 0 Comments

Why the CIA leaks confirm what we have been saying all along

[fa icon="calendar'] Mar 13, 2017 11:53:50 AM / by Stefan Topuzov

WikiLeaks posted last week 8,761 documents revealing an arsenal of hacking tools used by the US  Central Intelligence Agency (CIA). The ability to turn smart TVs into listening devices, or take remote control of smart cars made the most headlines. However, this was no news for the cybersecurity community, which has been vocal about the weak security of many Internet of Things (IoT) products. In a similar way, the unveiled Android exploits came as no surprise to Secure Group. They are, in fact, the same thing we have been telling users for years.

Read More ...

[fa icon="comment"] 0 Comments

SHA-1 algorithm officially dead, Secure Chat not compromised

[fa icon="calendar'] Mar 6, 2017 11:35:59 AM / by Stefan Topuzov

Google announced last month the first ever collision generated in the SHA-1 cryptographic hashing algorithm. Or to paraphrase it – SHA-1 is not secure anymore. Truth be told, theoretical flaws in the algorithm were known for a long time. And this is why Secure Group has already moved on to SHA-2 for the implementation of Off-the-Record (OTR) encryption in our proprietary chat client, Secure Chat. But what does SHA-1’s demise mean for cryptography and security?

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line