VaultChat Security: Protecting Your Conversations

Your Privacy is Our Priority

Give your clients the best possible experience

Your Security is Our Top Priority: Our Commitment to Protecting Your Data

Security-first Development

Designed to prioritize the protection of your privacy and communication data from the start.

Multi-layered, defense in-depth strategy

VaultChat uses more than just end-to-end encryption to secure your communications against potential threats and evolving cyber risks.

User-controlled Security & Privacy

We ensure no communication data is ever seen in plaintext by VaultChat’s infrastructure with user-controlled encryption keys.

Independently Audited

VaultChat applications and infrastructure are independently audited by Cure53 to ensure the highest level of code and data security.

Securing Your

Communication Data

AES-256 encryption is currently considered one of the strongest encryption standards available. It has not been broken or compromised, and is widely used by organizations that require the highest level of security for their data. AES-256 remains updated with regular reviews and updates to maintain its effectiveness against emerging security threats.

End-to-End Encryption

All communication is secured with encryption from sender to recipient for private conversations.

User-Controlled Keys

Private encryption keys are generated and stored on your device so that no plaintext data passes through VaultChat’s infrastructure.

Perfect Forward Secrecy

Each message and call in a conversation is secured with unique ephemeral encryption keys.

Contact Verification

Protect against Man-In-The-Middle attacks by verifying the identity of new contacts and authenticating their keys used in end-to-end encryption.

Securing Your

Stored Data

Composite key brute-force protection is a security measure that adds an additional layer of protection to an encrypted message. It involves using multiple keys to encrypt a message, making it more difficult for attackers to guess or crack the encryption through brute-force attacks. By using composite keys, encrypted data remains secure even if one of the keys is compromised.

Maximum Password Attempts Limit

Limit the number of incorrect password attempts to keep your data protected in case you lose your device.

Password Protection

Our required password protection keeps your data in VaultChat encrypted and protected even if your device is unlocked.

Argon2

Argon2 is a password-hashing algorithm that uses a combination of memory and CPU power to protect against brute-force attacks. It is designed to be more secure and efficient than previous password-hashing algorithms.

Encrypted Data at Rest

All data stored in VaultChat is encrypted using SQLCipher with AES-256.


FAQ

What is Perfect Forward Secrecy?

Perfect Forward Secrecy (PFS) is a security feature that ensures that the confidentiality of past messages is protected even if a party’s private key is compromised. It works by using a unique key for each session, making it difficult for an attacker to decrypt past communications if they obtain the current session key.

What is Argon2?

Argon2 is a password-hashing algorithm designed to protect against brute-force attacks. It uses a combination of memory and CPU power to make it more difficult and time-consuming for attackers to guess passwords. Argon2 is considered more secure than previous password-hashing algorithms and is recommended by the Password Hashing Competition (PHC) as the winner of their password-hashing competition.

What are User-Controlled Keys?

User-Controlled Keys (UCK) allow users to control the encryption and decryption of their data. With UCK, users can generate and manage their own keys, giving them full control over who has access to their encrypted data. This provides an extra layer of security and privacy, as only the user with the UCK can access the encrypted data.

What is Composite Key Brute-Force Protection?

Composite Key Brute-Force Protection is a security measure used to protect encrypted data from brute-force attacks. It involves using multiple keys to encrypt a message, making it more difficult for attackers to guess or crack the encryption. Even if one of the keys is compromised, the encrypted data remains secure due to the use of multiple keys.

Can I backup my data?

Currently, no. As we do not store any data it is not possible to create any backup of your device locally or remotely. We are working on developing an encrypted back-up file to store directly in your device, usb stick or any other storage in your possession,

en_USEnglish