Our Enterprise Privacy Platform is born from a strong set of beliefs and built on a fundamentally different mobile-first architecture designed by some of the best minds in mobile technology, encryption, security and privacy. The protection of your communications is what we do best.
Built on a fundamentally different protocol
When a Silent Circle subscriber makes a phone call or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end on our crystal-clear secure network. ZRTP provides true peer-to-peer key negotiation and management for secure VOIP communication.
Born from strong beliefs
OUR USERS OWN THE KEYS
In accordance with encryption best practices, we don’t hold or have access to the keys that encrypt our customers’ private communications data whenever possible. Accordingly, our secure communications products use “peer-to-peer” encryption. Any conversation, video, text, or video teleconference is encrypted from your device to the other party’s.
OPEN SOURCE ADVOCACY
Silent Circle believes strongly in transparency. And because we value and encourage community input and review of our systems and services, Silent Circle hosts a bug bounty program for reporting qualifying security vulnerabilities.