Silent Phone: secure mobile communications
Upgrade your device’s security with Silent Circle’s peer-to-peer encrypted application for secure voice and messaging. Silent Phone brings our enterprise-grade security features to iOS, Android and Silent OS mobile devices.
$9.95 monthly subscription.
- Protected from the moment you hit send
- Encryption is performed on all devices that carry the application.
Full burn functionality.
- Cut out the man-in-the-middle
- Short authentication strings safeguard against attacks.
- Easy to use
- No training required. Intuitive and familiar messaging app design.
Direct access to Technical Support
- VoIP calling
- Encrypted calls with any iOS, Android or Silent OS device.
No hardware or SIM card required.
- Group messaging
- Files, photos, video and voice shared securely within groups.
- Conference calls
- Up to six users all secured and identified.
- Video calls
- Up to 100MB file transfer
- Scale up
- Unlimited Secure Voice and Messaging between Silent Circle Members.
Easily add accounts to accommodate any size team growth.
Unlimited peer to peer calling
Unlimited talk, text, video and conference calls between Silent Phone members
Secure messaging & file transfers
Completely secure messaging
Send and receive large files up to 100MB per message
Available on iOS and Android
Silent Phone is compatible with most iOS and Android mobile devices
Easy deployment & management
Simple deployment with no hardware, maintenance, or training required Manage from the web, active directory, or existing MDM
|Functionality||Voice, video, text, group calls, file transfer up to 100mb||Voice, video text, group chat, file transfer||Voice, text group chats||Voice, video, text, group chats, file transfer up to 105mb||Voice, video, text, group chat, file transfer up to 5G|
|Technology||Peer review, open source, end-to-end encryption||Open source, end-to-end encryption||Open API||End-to-end encryption||Open source, end-to-end encryption|
|Security||User holds the keys||User holds the keys||Company holds the keys||Company holds the keys||User holds the keys|
|Identity Protection||No native phone number required||Requires native phone number||Requires native phone number||Requires native phone number||No native phone number required|
|Contact Scraping||No requirement, opt-in not stored on servers, uses hashing to protect privacy||No requirement, opt-in not stored on servers, uses hashing to protect privacy||Yes||Yes||No requirement, opt-in not stored on servers, uses hashing to protect privacy|
|Ephemerality||1-minute to 90-day burn functionality & burn on demand||Yes, limited capability||No||No||1-year max delete functionality on end user devices|
|Target Audience||B2B / B2C||B2C||B2C||B2C||B2C / B2B|
|Company Jurisdiction||USA||USA||Virgin Islands, UK||USA||USA|