Within the MEGA Secure we have two end-to-end encrypted mobile phone communication apps available.
Both use a custom 256-bit OTR protocol, using Perfect Forward Secrecy; Double ratchet and extended triple Diffie-Hellman. The reason we chose Perfect Forward Secrecy is that it provides assurance that your one-time (message and calling) session keys will not be compromised, even if the participants’ private keys are compromised in the event of a targeted network, mitm, or device attack.
This is to protect your communications against all types of attacks at all times and in every situation.
The difference between the both apps are:
1) Global encrypted phone to phone communications, between all MEGA users
2) Closed group communications, between users of the same trusted network
True End-to-End Encrypted Mobile Phone to Phone Communications
Participants have the ability to communicate anonymously using a MEGA ID
No use of Phone Number, Email Address, Location, App Store or Cloud Hosting
Both MEGA Secure + Stealth have a lock screen - with max. 10 allowed attempts
Before entering the MEGA Secure + Stealth , users must enter their private Pass Code Side channel and brute force attack protection
Whenever users are are forced to enter - they can enter this Emergency Distress Code. Automatically initiating the secure data removal (wipe)
Protecting your anonymity and privacy with servers located in Switzerland Encrypted Privacy Mobile Phone + Communications
To protect your privacy + communication contents. You have the ability to initiate a distress emergency wipe
Request a remote emergency wipe of all communications in the Secure + Stealth
Everything will be destroyed
We always verify the MEGA ID with the Secret Code. Once these match, we initiate the remote wipe procedure
Protecting your privacy against at any given moment The procedure of the Secure + Stealth Wipe: 1. Emergency Encryption over Encrypted Data 2. Overwrite Emergency Encryption with Fake Data 3. Remove the Overwritten Fake Data and Restart App
Set per contact and communication your desired messaging burn timer
Have the ability to verify your contact and shared public keys
Perfect Forward Secrecy, from Device to Device, AES-256 encryption
Each message is end-to-end encrypted with unique keys per session
All encrypted audio and video calls use peer-to-peer communication
Create encrypted group chats with many participants in your contact list
MegaProtected --- We Keep You Protected.