Encrypted Mobile Phone Communications

Protecting Your Privacy + Anonymity with
Encrypted Mobile Phone to Phone Communications

Within the MEGA Secure we have two end-to-end encrypted mobile phone communication apps available.


Both use a custom 256-bit OTR protocol, using Perfect Forward Secrecy; Double ratchet and extended triple Diffie-Hellman. The reason we chose Perfect Forward Secrecy is that it provides assurance that your one-time (message and calling) session keys will not be compromised, even if the participants’ private keys are compromised in the event of a targeted network, mitm, or device attack.


This is to protect your communications against all types of attacks at all times and in every situation.


The difference between the both apps are:
1) Global encrypted phone to phone communications, between all MEGA users

2) Closed group communications, between users of the same trusted network

Learn how we protect your privacy + anonymity

True End-to-End Encrypted Mobile Phone to Phone Communications

Privacy Phone to Phone Communication

Participants have the ability to communicate anonymously using a MEGA ID

Anonymous Meta Data Privacy Protection

No use of Phone Number, Email Address, Location, App Store or Cloud Hosting

Double Device + Apps Brute Force Protection

Both MEGA Secure + Stealth have a lock screen - with max. 10 allowed attempts

Privacy Protection
Access Pass Code

Before entering the MEGA Secure + Stealth , users must enter their private Pass Code

Side channel and brute force attack protection

Ultra Privacy Protection Distress Pass Code

Whenever users are are forced to enter - they can enter this Emergency Distress Code.

Automatically initiating the secure data removal (wipe)

Private & Encrypted Mobile Phone Communications

Protecting your anonymity and privacy with servers located in Switzerland

Encrypted Privacy Mobile Phone + Communications

Distress Emergency + Privacy Protection Code

To protect your privacy + communication contents. You have the ability to initiate a distress emergency wipe

Request 24/7 a Remote Emergency Wipe

Request a remote emergency wipe of all communications in the Secure + Stealth
Everything will be destroyed

Your Trusted Contacts May Initiate a Remote Wipe

We always verify the MEGA ID with the Secret Code. Once these match, we initiate the remote wipe procedure

Unretrievable > Privacy Protective > Conversations + Data Wipe

Protecting your privacy against at any given moment

The procedure of the Secure + Stealth Wipe:

1. Emergency Encryption over Encrypted Data
2. Overwrite Emergency Encryption with Fake Data
3. Remove the Overwritten Fake Data and Restart App

Communication Burn Timer

Set per contact and communication your desired messaging burn timer

Verify Contacts & Keys

Have the ability to verify your contact and shared public keys

End to End Encryption

Perfect Forward Secrecy, from Device to Device, AES-256 encryption

E2E Encrypted Chats

Each message is end-to-end encrypted with unique keys per session

E2E Encrypted Calls

All encrypted audio and video calls use peer-to-peer communication

E2E Encrypted Groups

Create encrypted group chats with many participants in your contact list