top of page
-
Can SecureCrypt see any of my messages/calls/communications?No. SecureCrypt users generate their own encryption keys (521-bit ECC) on their device, and these keys do not leave the device. SecureCrypt has built our system around a zero-trust framework which ensures only your intended recipient receives your message/calls/requests. Nobody can browse for your private ID, it must be known to them, unlike many free encrypted chat/voice apps. The only data we can see is your ECC ID, and the date you originally signed up.
-
Does SecureCrypt respond to law enforcement requests?No. SecureCrypt is committed to protecting the privacy and security of its users. As part of this commitment, SecureCrypt does not respond to requests from law enforcement for access to user data or communications. SecureCrypt employs end-to-end encryption (E2EE) across all communications conducted on our platform and our system is designed with a zero-knowledge architecture, ensuring that we do not have access to user data, nor do we retain the ability to comply with such requests. Only the communicating users possess the decryption keys necessary to access the content of their communications. As a result, our company does not have the technical capability to decrypt, access, or retrieve the requested data. We do not store encryption keys or have any access to the content of communications that take place on our platform. Consequently, we are unable to provide any data that may be responsive to any request. Our infrastructure and encryption protocols are specifically built to prevent any unauthorized access, including from government or law enforcement agencies. Furthermore, our infrastructure is located in privacy friendly jurisdictions to ensure maximum user privacy.
-
What information can SecureCrypt see about my device?To secure our devices, SecureCrypt uses our own self hosted MDM in our secure data centre. We also use our own private self hosted VPN. This is a key advantage as our VPN is completely self hosted and private, and works in countries where many commercially available VPN's do not. The incredible design of our MDM allows us to privately manage our own secure, private app store. This organizational play store is only available on our custom devices and can only be managed by our company. This is very different from what is available on standard smartphones. Our organizational play store is controlled exclusively by SecureCrypt. All applications are signed internally with our cryptographic keys, further guarding against malicious code attacks. This allows secure distribution of our custom applications to MDM secured devices. SecureCrypt recommends going with our recommended setup to secure your organization. Our MDM has no access to our ecosystem at all. This means our MDM doesn’t have access to any of our infrastructure, nor does it have access to the application data on our secure devices. Furthermore, our MDM doesn’t track your location. If the GPS was ever accessed maliciously, (which is not possible, as we disable our GPS sensors amongst other things) mock location data is sent – further ensuring your privacy. Our secure SIM's also prevent the tracking of any location based requests (ATI Requests) Key Advantages: offers self hosted, completely independent management option, (including VPN) ensuring SecureCrypt, nor your wireless provider cannot ever see any of your data, even if compelled. We have nothing to send, therefore, nothing to see or show if anyone asks us. manage mobile devices from a single management interface, reducing risks and ensuring regulatory compliance. ownership model includes bring your own device company owned, personally enabled, and company owned business only.
-
What kind of security do SecureCrypt eSIM/SIM offer?SecureCrypt offers the highest level of privacy which includes securing the cellular network. This is something that you cannot get with other providers of encrypted services and a service that free apps cannot provide. Our Secure Global SIMs can work on any model phone, including iOS/Android, Samsung, Nokia, Blackberry, Google Pixel, and many more. Our Secure Global SIMs come with the following features: Features Subscriber Location Protection (Location Blocking) Subscriber Identity Protection GSMA Security OTA Encryption Mutual Authentication Secure Connectivity Private APNs SIM Jacker Protection Tamper Proof SIMs Any location tracking request is blocked by default on the SS7/network/cellular level. Our telecommunications infrastructure allows for this as SecureCrypt uses a secure cellular core, which allows us access to granular security configurations that other companies do not provide. To disclose subscriber’s location, SS7 attackers attach to the international SS7 network and query the subscriber’s location using different MAP operations, such as ATI, SRI-SM, PSI, etc...These MAP operations can be used to learn user identity (IMSI) and cell level location information. SecureCrypt secure mobile core network is equipped to fight against such attacks by monitoring incoming traffic and blocking MAP requests. Please contact us and ask our reps for a full list of secure eSIM/SIM features, and a description of exactly how we protect our customer's cellular network/SS7 connection.
-
How do I get SecureCrypt app updates?SecureCrypt uses our own private app store for all of our distribution and updates. We are not affiliated with Google Play, or the App Store, and work off of a closed, private system. You will be notified that an update is forthcoming, and updates take only a moment to complete.
-
Does SecureCrypt use server storage?No. SecureCrypt does not use server storage for anything whatsoever. All communications are relayed only fully end-to-end encrypted to the intended recipient. We do not store any data, or metadata. All data including metadata is fully end-to-end encrypted both at-rest and in-transit.
-
Does SecureCrypt Use Encrypted Back Ups?At SecureCrypt, we employ advanced encryption techniques to safeguard your data with a focus on protecting your privacy. Our encrypted, password protected backups include only your contacts and vault, ensuring that these critical components are securely stored and recoverable in the event of data loss. However, we deliberately exclude message content from backups. This decision is driven by our commitment to maintaining the utmost privacy for your communications. Messages often contain sensitive information that, if backed up, could pose a significant risk if accessed by unauthorized parties. By not including messages in the backup process, we eliminate the possibility of this data being compromised during transmission or storage, even in the unlikely event of a security breach. Our use of end-to-end encryption (E2EE) ensures that data is encrypted on your device before it is transmitted and stored, with only you holding the decryption keys, and only you holding your password. This means that even in scenarios where backups are accessed, the content remains secure and private, inaccessible to anyone but you.
-
What security features does SecureCrypt have?At SecureCrypt, we are unwavering in our commitment to upholding users' rights to privacy. We ensure that all communications remain secure and free from surveillance, protecting our users rights to privacy. Our dedication to privacy is at the core of everything we do, and we relentlessly defend this fundamental right against all threats. Application Security: Encrypted Chat Encrypted Calls Encrypted Group Chat Encrypted Vault Encrypted File Transfer Encrypted Camera Encrypted Back Ups Private On-Premises Solutions for SMBs Phone Cloak - Appears Like Regular Phone - Code Used To Access Hidden System Decentralized Globally with Server & IP Rotation Anti-Surveillance Technology with IMEI Changing Every 30 Mins 24 Hour Self Destruction of Servers & Geo-Location Changing Offshore in Privacy Friendly Jurisdictions Systems IP Masking SOS Distress Notification to your Contacts on Wipe Secure Voice Changer Self-Destructing Messages Duress Password Stealth Mode (Android Only) Chat Masking (Existing Conversations Change to Random Ones) Device Lock on Shaking Vault Passcode Tamper Proof Wipe Functions Panic Wipe Remote Wipe USB Developer Mode Proofing Cable Detection/Prevention Compromise Detection and Mitigation Screenshot Detection Reliability in Low Reception Areas Multi Languages - All Translations Done Locally, no 3rd Party Translations Global Secure SIM Hardware Security: Triple Layer Encryption Brute Force Protections Tamper-Proof Hardware Root of Trust Firmware Validation Secure Boot Enhanced Kernel Reinforcement & Protections Enhanced Memory Protections Full Disk Encryption Cellular Protection - Secure Global SIM: Subscriber Location Protection (Location Blocking) Subscriber Identity Protection GSMA Security OTA Encryption Mutual Authentication Secure Connectivity Private APNs SIM Jacker Protection Tamper Proof SIMs Offshore Private Cellular Provider - Privacy Friendly Jurisdiction Cannot be opened by Cellebrite, GrayKey and other leading mobile forensic companies No Location Permissions requested or required by SecureCrypt app Location Tracking blocked on SIM / SS7 / Cellular Network level SecureCrypt, and your wireless provider cannot see your data No phone number tied to your device, not required for sign up No email address necessary for registration/activation All tracking sensors WiFi/GPS/Bluetooth/NFC disabled at kernel level Password Brute-Force/Auto wipe protections USB port disabled for file transfer, enabled only for charging Network connections secured with 4096-bit SSL App housed with encrypted partition on device, which is fully hidden and only accessible with user defined code Private App Store with applications internally signed using our own cryptographic keys All devices are non-rooted and non-Jailbroken to maintain device security and integrity All infrastructure located within privacy friendly jurisdictions
-
Why can’t I recall/unsend a message?Recall/unsend can only happen if messages are stored on a server. We do not store messages on our servers therefore we cannot offer this feature. Any service that allows recall/unsend options are storing your messages. Any unsend feature means your messages are stored somewhere, which defeats the purpose of our higher standard of privacy.
-
Do you support both Android and iOSYes! SecureCrypt is proud to be the first provider in the secure communications space to offer both Android and iOS versions of our mobile encrypted communications solution.
-
Where can I buy SecureCrypt?SecureCrypt is available through our global partner network. All of our trusted Global Partners have many years of industry experience, and we carefully verify our sellers to keep our clients safe. SecureCrypt Global Partners: Columbia: Encriptados - Global Partner / Online Retailer (Columbia) Mexico: Puzzle - Mexican Global Partner Brazil: Secure Privacy - Brazilian Global Partner - Website - Instagram Albania: Endri Hoti - Albanian Distributor - Instagram Contact Venezuela: MenteProtectiva - Venezuelan Distributor - Instagram Amsterdam: Global Privacy - Global Partner / Online Retailer Toronto: Link It Up - Global Partner Organizations: REDSEG Latin America Member Global Encryption Coalition Member
-
What is SecureCrypt?SecureCrypt is a secure communications (voice + data) provider. We provide a secure, encrypted phone which is locked down and protected against both physical and remote intrusion attacks, and any eavesdropping attempts. SecureCrypt uses many advanced security features not found on free, or commercial mobile security solutions / apps including: advanced hardware/memory based protections, application based protections, device/firmware based protections, cellular network based protections and more. A self-hosted, and self-managed instance of our secure MDM protects our device, and our private, custom engineered encrypted chat/voice application secures your communications. SecureCrypt is available in a secured, isolated and private Android / iOS ecosystem. SecureCrypt is a privately distributed application, we have no connection to Google Play or the App Store. We use our own secure, and fully encrypted app store which sits on our own private network. SecureCrypt provides both Android and iOS versions of our encrypted communications solution.
-
How can I reach SecureCrypt support?For technical assistance, please contact the reseller from whom you purchased SecureCrypt. If you cannot find an answer to your question in the FAQs, please reach out to us at info@securecrypt.ca. For all other inquiries, please start by filling out our Contact form on our website at http://securecrypt.ca. An agent will respond shortly.
-
Where is SecureCrypt located?SecureCrypt is located in Canada. Our infrastructure is housed within our own secure data center in a secure facility monitored and staffed 24/7 365. Strong Canadian laws place privacy and human rights at the cornerstone of our Charter of Rights and Freedoms. Additionally, some of our technical infrastructure is located in privacy-friendly jurisdictions offshore, ensuring the highest standards of privacy and security for our users.
-
Can I use SecureCrypt with my own SIM card?Yes. You can purchase your own SIM card, or you can use our Secure SIM card, which we recommend for the highest level of privacy and security.
-
How is the battery life with SecureCrypt devices?Our app is designed using lightweight yet the highest-grade encryption algorithms, providing unparalleled strength and security. Additionally, SecureCrypt includes a feature that allows secure communication even in areas with low data reception, all while maintaining high battery life. With SecureCrypt, you can be assured that your communications are both secure and efficient, no matter where you are. Our battery life typically lasts anywhere from 2-3 days on a Samsung Galaxy model, using the app to communicate on a regular basis throughout the day.
-
Who are SecureCrypt clients?Our clients include privacy-minded consumers, private industry, and enterprises from a wide range of sectors globally. Our clientele spans private banking, investment, precious metal mining, high-net-worth individuals, media personalities, entertainers, and professionals in the financial, pharmaceutical, technology, and private security industries, among others. As data breach disclosure laws become increasingly common worldwide, small to medium-sized businesses are often targeted by hackers due to their typically limited IT resources. SecureCrypt encrypted phones ensure that your personal mobile communications are always protected. We handle your security so you can focus on your business with confidence.
-
Why isn't SecureCrypt free?SecureCrypt is developed and maintained by our team of expert in-house engineers and software developers. We offer multi-layer encryption and advanced security features that are unmatched by any free app. Our unparalleled security is complemented by a sophisticated, luxurious design. Our developers and engineers are dedicated to continuous innovation, creating user-friendly features while meticulously maintaining our private server infrastructure. The pricing of SecureCrypt reflects these ongoing efforts. Unlike free apps that monetize your personal data by selling it to third parties, SecureCrypt is committed to preserving your privacy. If you don’t pay for a service, you often end up paying with your data instead. SecureCrypt only stores your username, activation date, and expiration date, ensuring that your personal information remains private. We are solely focused on security and privacy, aligning with our clients' expectations and our strong pro-privacy principles.
-
How can I become a SecureCrypt Global Partner?We’re always looking for experienced partners to join our growing community of SecureCrypt Global Partners, Distributors, and Retailers worldwide. By partnering with us, you can be part of a cutting-edge movement in mobile security and privacy, offering unparalleled products to your clients. Visit our Partner page to learn more about the benefits of joining our network, and fill out our Partner Request Form to become part of our team of successful and innovative partners. Join us and be at the forefront of secure communication solutions.
bottom of page