Technology

Our Enterprise Privacy Platform is born from a strong set of beliefs and built on a fundamentally different mobile-first architecture designed by some of the best minds in mobile technology, encryption, security and privacy. The protection of your communications is what we do best.

CONTACT SALES

Built on a fundamentally different protocol

When a Silent Circle subscriber makes a phone call or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end on our crystal-clear secure network. ZRTP provides true peer-to-peer key negotiation and management for secure VOIP communication.

Born from strong beliefs

OUR USERS OWN THE KEYS

In accordance with encryption best practices, we don’t hold or have access to the keys that encrypt our customers’ private communications data whenever possible. Accordingly, our secure communications products use “peer-to-peer” encryption. Any conversation, video, text, or video teleconference is encrypted from your device to the other party’s.

Learn More

OPEN SOURCE ADVOCACY

Silent Circle believes strongly in transparency. And because we value and encourage community input and review of our systems and services, Silent Circle hosts a bug bounty program for reporting qualifying security vulnerabilities.

Report a Bug

Private by Design

Designed by the best minds in mobile technology, encryption, security and privacy, our fundamentally different technology sets the standard for enterprise privacy in today’s mobile-first world.


READ OUR STORY

Doc Icon

Additional Information Please visit the links for a complete explanation of our policies, compliance and protocols.