top of page
Search

How SecureCrypt secures your Contact List

Updated: Aug 6




One of the most overlooked aspects of secure communication apps is the contact list. Your contact list can reveal a lot about you, such as who you’re connected to and who you communicate with, both of which can be exploited to undermine your privacy and security. This article explores how SecureCrypt secures your contact list through various measures:

  • SecureCrypt ECC ID Practices

  • Managing Your Contact List

  • Changing Contact Names

  • Contact List Storage

These elements are part of a comprehensive approach to creating a truly secure phone.


SecureCrypt ECC IDs: The First Layer of Defense

SecureCrypt ECC IDs, the usernames of SecureCrypt users, are the first step in securing your contacts and yourself. Here’s how they work:

  • Every SecureCrypt ID is a randomly generated, unique 5-character identifier.

  • No personally identifiable information is ever associated with any SecureCrypt ECC ID. Nothing connected to it will reveal the user's identity.

These features allow users to remain anonymous if they choose. There are no phone numbers, names, or other information that could compromise the identity of any user.


Why SecureCrypt Doesn’t Use Phone Numbers

Many “secure” messaging apps make the mistake of using phone numbers for user identification, which poses several risks:

  • People can link your phone number to your identity, compromising your privacy.

  • Unwanted contacts can find your number and add you to group chats, exposing you to potential threats.

  • Your phone number is connected to a lot of personal information, which can be exploited by attackers.

SecureCrypt does not use phone numbers for these reasons. This ensures that the phone numbers connected to SecureCrypt devices remain unknown and secure.


Managing Your Contact List

Properly managing your contact list is crucial for maintaining privacy. SecureCrypt employs several tactics to help you manage your contacts:

  • Users directly control who can message them before any message is sent. Each contact request must be authorized by the user.

  • Your ECC ID is not discoverable on any SecureCrypt server, ensuring that no one can search for you and send unsolicited messages.

  • The only way to contact another user is by personally sharing your ECC ID.

These measures ensure that you can manage your contact list effectively and securely.


Protecting Your Contact List

Once a contact is approved, you have control over their access:

  • Any contact on your approved list can be deleted or blocked.

  • Managing your contact list involves blocking and restricting access, not just adding contacts.

This approach helps prevent unauthorized access and ensures that your contact list remains secure.


Self-Destructing Messages

Storing chats indefinitely can pose a risk to your privacy. SecureCrypt ensures that:

  • Chats are deleted from your phone once they are no longer needed.

  • There are no server backups of your chats, unlike other apps that store data in the cloud.

This feature ensures that once you disassociate from a contact, all traces of communication are permanently deleted.


Custom Contact Names

To further protect your contacts, SecureCrypt allows you to create custom contact names. This makes it difficult for someone to identify your contacts by looking over your shoulder or stealing your phone. Custom names ensure that your contact list remains private even under direct observation.


No Directory Servers

SecureCrypt avoids using directory servers, which are often targets for data breaches. Here’s why this is important:


  • Directory servers can expose your phone number to anyone who has ever had it, allowing them to contact you without your consent.

  • Avoiding directory servers prevents unauthorized access and protects your contact list from being leaked.


This approach contrasts sharply with other apps that store personal data on servers, risking breaches and unauthorized access.


Securing Your Contact List

Securing a contact list involves more than just protecting phone numbers. It requires securing every aspect of how the data is stored, even locally on your phone. SecureCrypt’s multi-layered security strategy ensures that your contact list—and therefore you—remain private and secure.


Key Takeaways

  • SecureCrypt ECC IDs are randomly generated and not linked to personal information.

  • You have full control over your contact list.

  • Chats are automatically deleted, ensuring no residual data remains.

  • Custom contact names protect against direct observation.

  • No searchable directory servers are used, preventing unauthorized access.


These measures are part of SecureCrypt’s comprehensive approach to secure communications. Contact us today to learn how SecureCrypt can help you and your organization maintain the highest level of privacy and security.

Comments


bottom of page