FAQ

Do your products have encryption backdoors?

No, they don’t. Backdoors are intentional flaws in security systems and encryption services that serve as a way for their creators to bypass the security. The products we offer have no such backdoors. We do not need elevated access to your messages or device to perform maintenance. We provide a service intended to secure people’s privacy. Leaving loopholes in our products so that we could gain access to them would have been at odds with that idea.

How do you guarantee the security of messages?

There are several layers of security protecting your messages. The first one is the strength of the encryption. The encrypted email and the encrypted chat apps use state-of-the-art cryptographic protocols such as PGP, OTR, OMEMO, and ZRTP to encrypt all communication channels: email, chat, and voice over IP. Our implementations of these protocols use best-of-breed technologies such as AES-256, SHA-256, 4096-bit RSA, and 4096-bit Diffie-Hellman.

All apps also use end-to-end encryption. This means that every message you send gets encrypted on your device, remains encrypted (and undecipherable to third parties) all along the way to the recipient’s device, and gets decrypted only once it arrives there. No one can decipher the content of your communications, even if they somehow succeed in intercepting them. Lastly, we do not keep anything on our servers. They are used just to facilitate communication between users. Every message that passes through the servers gets instantly deleted the moment it gets sent to the end recipient. In Encrypted Chat, messages get sent only when the two communicating parties are online. This means that no message ever lays dormant on our servers, waiting to be sent.

How does message self-destruct work?

You can assign countdown timers to your messages sent with the Encrypted Chat app. The one function is called Time to Live (TTL), which starts the countdown the moment the message is sent. Regardless of whether the recipient opens and reads the message when they receive it or not, it gets deleted on both devices when the timer runs out. The other function is called For Your Eyes Only (FYEO). In it, the timer starts when the recipient opens the message. Once it runs out, the message also gets deleted on both the sender and the recipient’s device.

How do you ensure your servers don’t get compromised?

Our gateway servers have multilayered protection. We use logical isolation, firewall filters, ACLs, and DDoS mitigation protection in excess of 1 terabyte of bandwidth. Moreover, we run our own BGP network for extra control and absolute security. Communication between our servers travels via a VPN tunnel, and no unencrypted traffic ever leaves our infrastructure.

What data plan does your product require?

The short answer is “none.” T1 COMMUNICATOR comes together with a multi-IMSI SIM card, which we provide with the device. The SIM card comes with an unlimited data plan which offers coverage in over 180 countries worldwide.

What benefits does the multi-IMSI SIM bring?

First, the multi-IMSI SIM comes with an unlimited data plan with full global coverage. Because T1 COMMUNICATOR uses only its encrypted chat and email apps for communications, this is all you really need. (You can also use Wi-Fi, if you prefer – although it is recommended to do it only over trusted networks.)

Second, because the SIM has up 16 IMSI numbers (mobile identities), it can switch between different carriers. This way you are always connected to the network with the best coverage at your current location and always get the best available signal and reception.