top of page
  • Country's cover by the International Encrypted Sim Card?
    Afghanistan Albania Algeria Andorra Angola Antigua and Barbuda Armenia Australia Austria Azerbaijan Bahrain Barbados Belarus Belgium Benin Bolivia Bosnia and Herzegovina Botswana Brazil Bulgaria Burkina Faso Burundi Cameroon Canada Cape Verde CAR Chad Chile China Congo Costa Rica Côte d'Ivoire Croatia Cuba Cyprus Czech Republic Denmark Dominica East Timor Egypt Equatorial Guinea Estonia Fiji Finland France Gabon Gambia Georgia Germany Ghana Greece Grenada Guinea Guinea-Bissau Haiti Hungary Iceland India Indonesia Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kuwait Kyrgyzstan Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macedonia Madagascar Malawi Malaysia Mali Malta Mauritania Moldova Monaco Mongolia Montenegro Morocco Mozambique Myanmar Namibia New Zealand Niger Nigeria Netherlands Norway Oman Papua New Guinea Paraguay Poland Portugal Qatar Republic of the Congo Romania Russia Rwanda Saint Lucia Saint Vincent and the Grenadines Saint Kitts and Nevis Saudi Arabia Senegal Serbia Sierra Leone Singapore Slovakia Slovenia South Africa South Korea South Sudan Spain Sri Lanka Sudan Suriname Swaziland Sweden Switzerland Tajikistan Tanzania Togo Tonga Trinidad and Tobago Turkey Uganda Ukraine Uruguay USA Uzbekistan United Arab Emirates United Kingdom Vanuatu Venezuela Yemen Zambia Zimbabwe
  • How to configure Android mobile with the Sim Card International Encrypted?
    Look for that application​ Sim Tool Kit ​ Choose Profil R6 Setting / Network & Internet / SIM cards & Cellular Network / Cellular Network / Network Settings - Data services while roaming - Need to be ON Access Point Names (APN) / Add New APN Name: fastaccess APN: fastaccess Save and select the APN you just created.
  • How to setting Iphone mobile witht the Sim Card International Encrypted?
    Make sure Data Roaming is ON Normally you do not have any setting to do, but if your data roaming is ON and still not working go to Sim Card application and Select profile R6
  • How much cost 1gig data?
    To depend the country your are, data plan will change!
  • Do I have monthly feed?
    No monthly feed - Sim Card cost 15$ USD and when you buy data, it's good for 12 months.
  • All option possible and setup for the Sim Card Encrypted International
    Uninformed, we must live in an era when information has become the most precious resource and at the same time the most powerful weapon. There's a reason it's so much easier to sell, share, manipulate, and use your information when you don't know what they're doing with it. Your Internet service provider, your cell phone manufacturer, your operating system developer, the creators of the applications you use, and public entities are just a few examples of those who can access your information without any kind of controls or laws protecting the privacy of your information. We present to you the SIM Encriptados, a SIM card created for your privacy and security of mind, a solution to one of the biggest security holes. Having the Encriptados SIM means having a private network provider who will be responsible for providing you with security and guaranteeing anonymity, preventing your information from being manipulated, shared or sold by a third party, with our sim, you can rest assured that you will not be able to be identified, located or intervened. The equivalent of being a ghost on the network, without an identity, location and your information fully encrypted. Features of the Encriptados SIM card: - Encryption of geolocation information making it impossible to locate in real time -Hide your IMEI to avoid associating the SIM card with a phone -It does not emit IMSI, which makes it impossible to locate the connection source -Call and data encryption -No records of our customers or personal data are stored -Not found or unidentifiable calls with features like DID, ID substitution and callback -We do not store call history -No time limit of use -Works in over 180 countries Here are some of the cases you are exposed to when using a SIM card from a common supplier: 1. Check the routing of your Internet connection 2. Control the data traffic coming out of your phone 3. IMEI and IMSI registration 4. Access your geolocation in real time 5. Logs of all your calls 6. Call pickup 7. Records of the time and location of the antennas to which it has been connected The phone company has all of your information at their disposal and you could also be a victim of call or locate eavesdropping at this time. There are no laws or entities that truly protect our information, so it is our responsibility to take care of it. Do you take your safety seriously? 🌐 Internationa Sim Card Encripted Command -1- 👉 🔁 Replacement number. *️⃣ 1️⃣5️⃣0️⃣ *️⃣ Substitution number #️⃣, please dial A replacement number must be dialed in international format; otherwise, an operator will not allow the call. You will have a replacement number until you change it. ————— 👉 🔄. Dynamic number substitution (random number substitution on each call) *️⃣ 1️⃣5️⃣0️⃣ *️⃣ 0️⃣0️⃣0️⃣0️⃣ #️⃣, please dial the number. Please run the command whenever you want to change a substitute number ————— 👉 👤🗣 Voice change activated. Your voice will change during a conversation. Once "Voice change" is enabled, your voice will be changed for both incoming and outgoing calls, unless you send the "Disable voice change" command. *️⃣ 3️⃣0️⃣0️⃣ *️⃣ 1️⃣ #️⃣ or 2️⃣ or… 7️⃣, tick (7 types of voice change). *️⃣ 3️⃣0️⃣0️⃣1️⃣ #️⃣ or… 7️⃣, check (7 types of voice change) for iOS ————— 👉 Voice change disabled *️⃣ 3️⃣0️⃣0️⃣ *️⃣ 0️⃣ #️⃣, dial. ————— ————— 👉 Voice change disabled *️⃣ 3️⃣0️⃣0️⃣ *️⃣ 0️⃣, dial. 👉 Check the balance*️⃣ 1️⃣0️⃣0️⃣ #️⃣,, dial. ————— 👉 Find the SIM ID and DID *️⃣ 1️⃣1️⃣0️⃣ #️⃣, dial. ————— 👉 Open the SIM menu (only available on a certain number of phones):#️⃣ 9️⃣0️⃣1️⃣, dial.————— 👉 Disable manual network settings:*️⃣ 7️⃣3️⃣0️⃣ #️⃣, please dial the number.————— 👉 Activate automatic network settings:*️⃣ 7️⃣3️⃣0️⃣ #️⃣, please dial the number.————— 👉 Callback active#️⃣ 9️⃣5️⃣4️⃣ ————— 👉 Deactivate the callback function #️⃣ 9️⃣5️⃣5️⃣ ————— 👉 Switch to English *️⃣ 7️⃣5️⃣0️⃣ #️⃣
  • What devices is Encrypted Sim compatible with?
    SIM Encryption works with all unlocked phones and tablets. It works with all cell phone brands on the market. Android, IOS.
  • Where can I use the Encrypted Sim?
    The Encrypted Sim works in more than 180 countries worldwide with a fast and reliable connection.
  • How often do I have to recharge the Encrypted Sim?
    While you are using the Encrypted Sim your balance never expires no matter how long it takes you to consume it. Learn how to recharge it on our website.
  • How does Armadillo Chat work?
    Armadillo Chat is a highly secure instant messaging application that respects your privacy. Just install it and add contacts to start enjoying encrypted chats, encrypted calls and secure communications. Messages are protected with military-grade keys and protocols so no one can access them.
  • On which cell phone can I install Armadillo Chat?
    Armadillo Chat can be installed on any type of Android or iOS mobile device.
  • Why use Armadillo Chat?
    In addition to being a 100% secure application, it is one of the simplest and most intuitive to use, which makes it a complete and practical application to communicate with any contact quickly and reliably. start using it.
  • What is Napoleon Chat?
    NapoleoN Chat is a peer-to-peer encrypted instant messaging application, which allows send text messages, images, audio, video, documents and make voice and video calls, in a SECURE, PRIVATE and FAST way.
  • What is @APODO or @Nickname?
    Apodo or nickname, is a user made up of at least 3 letters and one number, through which users are identified within the application.
  • How do I recover my account?
    Remember to recover your account, previously you have to fill out the recovery form, otherwise, you must create a new user.
  • Once download and install the app, must open and follow next steps:
    Step 1: Select the recovery account option to proceed with the recovery options. Step 2: Introduce the nickname which you have registered in the app. And click on recovery. Step 3: Answer the security questions. Step 4: Once the answer have been entered and validated, must enter a new pin to access.(pin should contain 4 numbers) Recovery account option, help you to recover nickname, contacts and preferences. Remember, a difficult answer is the key for your privacy.
  • How much time I have to enter the register activation code?
    The entry time of the registration activation code is 24 hours, however, the code arrives by push notification, that means, if it is deleted , you must request a new code again. There is a maximum of 3 attempts to enter the code, after these, you must wait 30 seconds to generate it again, if you do not enter the code correctly after 3 attempts, you have to wait 5 minutes again.
  • How to add an user?
    For adding your contacts, you can do it in two ways, in the upper right corner there is a icon “USER WITH A PLUS NEXT TO IT” or add a user from de contact list in the lower right corner. User icon: Step 1: Select the icon “user with a plus next to it”, in the upper right corner. Step 2: Once there, in the search bar, type the nickname of the contact that you want to add. Step 3: The possible options of you search will be listed ,once you find the user you are looking for, select add option and your request will be sent. To start a conversation you must wait until the user accept the request.
  • Contact agenda
    Step 1: Select contact agenda icon. Step 2: Once there, write in the search bar the nickname of the contact to add. Step 3: The possible options of you search will be listed, once you find the user you are looking for, select add option and your request will be sent. To start a conversation you must wait until de user accept the request.
  • How to invite friends to use the app?
    Invite friends to use the app following the next steps: Step 1: Main menu and select invite someone. Step 2: Press the Share button and select one of the options to send a download link. Step 3: After send download link, your friends and relatives can contact you through NapoleoN Chat. Protect the privacy of your friends, invite them to use NapoleoN Chat.
  • PAYMENTS AND SUBSCRIPTIONS
    To activate it, go to main menu and select subscription option, the following options will appear there: Subscription: This field indicates the status of the subscription, which can be a trial period (free), or monthly, semi-annual or annual (paid). Subscription expiration: Indicates the day your subscription expires, which you can renew again. Subscription type: Once past the trial period, select the type of subscription you want to pay to continue using the application. It can be annual, semi-annual or monthly.
  • ATTACHED
    How to send photos to your contacts? Send photos directly to your contacts pressing the camera icon in the down side. Take pictures; and touch in the right down corner to send it. How to send video to your contacts? Send videos directly to your contacts, pressing the camera icon in the down side. Unlike to take photos; you must keep press the camera button to record a video and touch in the down right corner to send it.
  • ESTATE
    How to update the status? To update the status, you must follow the steps: Step 1: Go to main menu. Step 2: Touch status option. You can choose one of the default messages or custom your status.
  • PRIVACY
    What is the default message self-destruct time? The system's default self-destruction time is 12 hours, therefore the messages sent will be deleted after the receiver has seen and this time can be modified as many times as the user wishes, choosing any of these options: 5 seconds, 15 seconds, 30 seconds, 1 minute, 10 minutes, 30 minutes, 1 hour, 12 hours, 1 day, 7 days. What is the self-destruct time for failed and unread messages? Choose two options 24 hours or 7 days. How to edit Access Pin? To edit Access pin, you must follow the steps: Step 1: Go to main menu. Step 2: Select security settings. Step 3: Select Pin Access option. Step 4: Type the old Access Pin and then type the new pin; finally, you must confirm the new Access Pin. Step 5: Press edit button. Then, you received an automatic message with the confirmation: "Access pin updated successfully". Where is the information sent and received stored? It is not stored on any server or database, however, it is hosted in encrypted form on the mobile device for the duration of the message, as each user has chosen the self-destruction time.
  • APPEARANCE
    How to choose the username format? Step 1: Go to main menu. Step 2: Select Appearance settings. Step 3: Select username format. You can choose how you want the information for the contacts to appear: Name and nickname, Name only or Nickname only.
  • How to choose the language of the application?
    For choosing the language of your preference to use the application, you must follow these steps: Step 1: Go to main menu. Step 2: Select appearance settings. Step 3: Press languages. Step 4: Choose the language of your preference and that's it.
  • How to select the time format?
    For modifying the time format, you must perform the following steps: Step 1: Go to main menu Step 2: Select appearance settings. Step 3: Choose time format. The application time format is for 24 and 12 hours, you can choose according to your preference.
  • How to customize the conversation background?
    If you want to customize the background of the conversations, you must perform the following steps: Step 1: Go to main menu. Step 2: Select appearance settings. Step 3: Select conversation background. You can choose an image by taking it directly with the camera or selecting it from the gallery.
  • How can I report a problem?
    Step 1: Go to main menu. Step 2: Select help. Step 3: You can send a comment, a suggestion or a bug report about the application. In the message space you will write your request and you will press the send button.
  • What is a VPN?
    A VPN, Virtual Private Network or Virtual Private Network, is a tool used to hide the IP and have secure and encrypted connections that protect data on the web. In addition, it allows you to modify the virtual geographic location regardless of the physical place where the user is.
  • Why is it important to have a VPN?
    With a VPN, you can access public networks with peace of mind, no one will be able to access your data and the risk of any threat will be reduced and you will be able to see content that is not available in your area. At home you will be ensuring that no one can access the network and not even the internet service company will be able to have knowledge of the browsing data. Furthermore, VPNs are going to help organizations protect themselves against information theft, hackers, and scams.
  • How does NordVPN work?
    NordVPN is the best and most reliable VPN on the market today. It will protect all your devices with just one click. You will be able to connect to thousands of shared servers in 33 countries around the world. Choosing from over 20 dedicated server locations. get yours
  • Learn more on the VPN, Nord Layer!
    Click on the link below to learn more on VPN Layers.
  • How does Salt work?
    Salt is a secure communications solution that provides the best shield for organizations or individuals to protect confidential information or sensitive data when communicating on mobile or desktop devices. It has encrypted calls and chats
  • How secure is the Salt Communication app?
    Salt has sophisticated encryption protocols that make it a completely secure and private application. No one external to the user or company will be able to access the information no matter how hard they try.
  • Why should my business have an app like Salt?
    In an increasingly digitized world, it becomes essential to have tools that help protect communications and confidential and personal information. The business sector is one of the most affected by cybercrime, it is important to protect the organization.
  • 1. How can I gain access to Salt Communications?
    Salt Communications offers a closed platform, so users cannot simply download the app from the app store and invite their friends and family. Salt Communications only provide access to the system to authenticated, verified organisations who pass our due diligence platform. We will not sell to individuals or groups who do not pass this process. Once authenticated organisations and employees are invited onto the system where they can then manage their own accounts and control who gains access to the system, as well as who those users can communicate with when on the platform.
  • 2. Is Salt available on all platforms?
    Yes, Salt is available for iOS, Android and Desktop devices.
  • 3. Does the Salt Communications system work globally?
    Yes, Salt Communications works across the globe on all networks. Salt Communications is designed for the international user: the service is agnostic of the underlying network and operates globally on 3G/4G/5G, LTE, WiFi and Satellite.
  • 4. How do I know Salt Communications is secure?
    Salt uses open source, publicly verifiable cryptography libraries. You don’t have to rely on our engineers to develop the strongest levels of encryption – the code running your communications infrastructure has been peer reviewed by a joint consortium of the best cryptographic minds in the world. The open source libraries and protocols we build upon include the following security features: • Pinned TLS – Transport Layer Security – for encrypted connections • Messages encrypted using Axolotl secure protocol (with Diffie-Hellman key exchange and a tamper proof hash (HMAC)) • Voice call signalling and setup using pinned TLS connections • SRTP – Secure Real-time Transport Protocol for peer to peer voice call transfer We are the only secure communications platform which allows our customers to install the infrastructure on premises, on their hardware, behind their firewalls. Our solution has been penetration tested by multiple different organisations. Many of our partners and customers have funded their own, independent, research to ensure our product is secure. To date, none of these test initiatives have discovered any security vulnerability or compromise.
  • 5. Why wouldn’t I just use WhatsApp?
    WhatsApp along with numerous other solutions such as Viber, Signal and Facebook Messenger are all ‘consumer’ messaging applications. These apps do offer end-to-end encryption within their app, but the negative thing about these solutions is that they believe ‘Encryption’ is ‘Security’. Salt Communications don’t think that this is the case. We believe that enterprises should see ‘Security’ as Encryption working hand in hand with control and management. The ability to control who gets access to the application, as well as control over how the system is run (SaaS or On-Premise) and how metadata is stored/managed. With recent high profile WhatsApp hacks, regular Pegasus attacks and previous Cambridge Analytica stories; large organisations need to ensure that they have full control over their technology solutions, and have the capability to control how their metadata is stored and used.
  • 6. What makes Salt Communications different?
    Salt Communications is very different to many competitors on the market. Firstly being a software solution, applicable for iOS, Android and Desktop devices, Salt Communications offer organisations with the capability to control who is invited onto the system, what way metadata is stored, and the capability to take the Salt Communications solution as an on-premise deployment. With secure peer to peer and group messaging, message broadcasting, peer to peer voice and video calls, 15 person conference calling and message burn, Salt Communications offer differentiated key features as well as unique enterprise features.
  • 7. What features are available on Salt Communications?
    Salt is the first company to provide a holistic solution for closed encrypted communications between modern smartphone users and the secure systems they access within their organisation. Our product provides full centralised control for administrators, as well as federated interfaces into and from trusted internal services. End users are those who need mobility coupled with the most secure voice and video calls, messaging and image/file transfer to enable critical decisions from any location. Salt offer the following core features: • One to One Text Messages • Group Text Messages • One to One Calls • Voice Conference Calls • Video Calls • Image, audio, and video sharing • Information sharing to large groups of users instantaneously • Secure event reporting around specific categorised incidents. • Document sharing; large and small
  • 8. Can I penetration test the system?
    Yes, Salt Communications gives interested parties full access to penetration test our solution. We can provide previous pentests to interested organisations, but we feel that carrying out an independent pentest via a trusted third party company is the most effective way to test the system. This ensures that Salt Communications have no effect on the results of the pentest, and the enterprise can be fully confident in the reliability of the results.
  • 9. What level of control of the system can we have?
    Salt Communication offers multiple ways for organisations to gain greater control of their own secure communications system. These include: ● Full on-premise installation ● Full white-label options ● White-label with private distribution function ● Integrations to pre-existing systems ● Encryption agnostic - we can use your preferred encryption technology if required ● Private Notifications - utilise your preferred private notification system ● Data retention control.
  • 10. What bandwidth is needed to use the system?
    Messaging Messages are asynchronous, so are not subject to latency issues. A 100 character message will use approximately 1500 bytes (1.5kB). When it is received, the response/acknowledgement back to the sender is approximately 900 bytes. Voice The Salt Communications app uses the WebRTC standards and protocols for handling the voice transmission functions. This includes the OPUS codec for adapting voice quality to varying network bandwidth. The codec can operate with bandwidths between 6Kbps and 510 Kbps. On an unrestricted network, the app will consume approximately 70Kbps in each direction for a peer to peer connection. The figure may vary depending upon network conditions and restrictions. When less bandwidth is available the app will reduce consumption while maintaining call quality. For 4G networks we see typical bandwidth usage of around 40Kbps in each direction. Our testing includes running the solution on many different types of simulated networks. These include WiFi, 3G, 4G, 5G and a specially tuned high latency, low bandwidth network with a profile of 15Kbps available capacity and 500ms latency.
  • 11. Who else uses this system?
    Salt Communications is used by clients across multiple industries due to Salt Communications capabilities. Salt Communications facilitates secure conversations anywhere in the world, allowing important decisions to be made virtually, a requirement for many different industries, including: ● Government ● Legal ● Policing ● Manufacturing ● Financial ● Insurance ● Transport ● Maritime ● Oil & Gas ● Media
  • 12. What is meant by secure communication?
    Secure communication is when two or more parties are corresponding, they do not want a malicious actor to overhear their conversation. Entities must communicate in a method that is resistant to listening in on or intercepting in order for this to be the case. People can share information with varied degrees of assurance that these actors cannot overhear them using secure communication methods such as a secure communications system such as Salt Communications.
  • 13. What are features of secure communications?
    A secure communications system allows professionals to carry out one-to-one and conference calls, one-to-one and group messages, file/image transfer and secure message broadcast capabilities. With a secure communications system such as Salt Communications we also provide many other unique features such as the ability to restrict users from taking screenshots, the ability to prevent users having the capabilities to download documents & images and the ability for users to purge messages from their device & all recipients devices too - a function that can be done manually, or have a timer setting.
  • 14. How can a secure communications system benefit my organisation?
    Having a secure communications system is the best armour organisations have to protect trade secrets and other sensitive, strategic and proprietary information when communicating on mobile devices. It is a software solution that is more than a secure mobile app: it has a web-based management platform for dynamic provisioning of secure mobile voice and text communications. Therefore, your organisation will have total control over their communications anywhere and at any time.
  • Is it possible to hack Secure Crypt cell phone?
    SecureCrypt cannot be compromised in any way and are immune to surveillance techniques and attacks from state and non-state actors
  • SecureCrypt cannot be compromised in any way and are immune to surveillance techniques and attacks from state and non-state actors.
    As the current state of privacy intersects with technology, politics, and surveillance, our service is necessary for industries, businesses, and individuals who need to protect their communications.
  • How is SecureCrypt different from other encrypted cell phones?
    SecureCrypt ensures that all security issues are addressed, from the operating system, network infrastructure, software, data transmission, and servers. Our advanced mobile security features are not available anywhere else. All data, including metadata, is encrypted both at rest and in transit with 512-bit ECC (Elliptic Curve Cryptography).
  • What is SecureCrypt?
    SecureCrypt is a secure communications (voice + data) provider. We provide a secure, encrypted phone which is locked down and protected against both physical and remote intrusion attacks, and any eavesdropping attempts. Blackberry UEM secures your device, and our private, custom engineered encrypted chat/voice application secures your communications. SecureCrypt is a privately distributed application, we have no connection to Google Play or the App Store. We use our own secure store which sits on our own private network.
  • Where is SecureCrypt located?
    SecureCrypt is located in Canada. Our infrastructure is housed within our own secure data center in a secure facility monitored and staffed 24/7 365. Strong Canadian laws place privacy and human rights at the cornerstone of our Charter of Rights and Freedoms.
  • Can I use SecureCrypt with my own SIM card?
    Yes. You can purchase your own SIM card, or you can use our SIM card.
  • Why isn't SecureCrypt free?
    SecureCrypt is developed and maintained by our team of in-house engineers and software developers and offers multi-layer encryption, security features which cannot be found on any free app, unparalleled security, and luxurious design. Our developers and engineers are constantly innovating and creating new user-friendly features while ensuring the maintenance of our private server infrastructure. As such, the price covers these costs. Most free apps sell your personal data to third parties. If you don’t pay for a service, you end up paying with your data instead. SecureCrypt is designed to ensure your privacy, only storing your username, activation date, and expiration date. We are in the security and privacy business only, we do not collect data as this is what our clients expect from us, and this does not align with our pro-privacy views.
  • Who are SecureCrypt clients?
    Our clients are privacy minded consumers, private industry, and enterprise alike. We have clients from many different industries globally including private banking, investment, High Net-Worth Individuals, media personalities, influencers, those in the financial, pharmaceutical, technology, private security industries, and more. Data breach disclosure laws are becoming more commonplace globally, and hackers often attack small to medium sized business as they are usually not staffed with an extensive IT department. SecureCrypt encrypted phones powered by Blackberry can ensure your personal mobile communications will always be protected, and kept to yourself.
  • How is the battery life with SecureCrypt devices?
    Our battery life is the best in the industry, our application was engineered from the ground up, and battery life was taken into account. Typically a charge will last you 1-3 days depending on use.
  • Where can I buy SecureCrypt?
    SecureCrypt is available through our global partner network. Contact us today, and we’ll put you in touch with the closest SecureCrypt Partner for you. All of our trusted Global Partners have many years of industry experience, and we carefully verify our sellers to keep our clients safe. You can choose to purchase either a 3, 6, or 12 month subscription to test out SecureCrypt and choose subscription terms best suited for your needs. You can also purchase online at any of our Global Partner’s e-commerce sites.
  • How can I reach SecureCrypt support?
    For technical assistance, please contact the reseller you purchased from. If you cannot find an answer to your question in the FAQs, please contact us at; info@thatsit.io An agent will respond shortly.
  • How to use the Silent Phone - Silent Circle app?
    Silent Phone – Silent Circle is an encrypted messaging app designed to protect communications. You can make end-to-end encrypted calls, send encrypted chats with a self-destruct timer, and any type of attachment securely.
  • How secure is the Silent Phone - Silent Circle app?
    When Silent Phone – Silent Circle users call or chat with each other, this transmission is secure and end-to-end encrypted with no backdoor policies and complete communications security.
  • On which cell phone can I install the Silent Circle app?
    Silent Phone – Silent Circle can be installed on any type of mobile device.
  • What is the Threema app for?
    Threema is an encrypted messaging app used to protect private communications. Threema is not only a private and encrypted messaging service, but it is also versatile and offers many possibilities.
  • How does the Threema app work?
    Threema is an open source that enables end-to-end encrypted calls and video calls and offers all the desirable features of a state-of-the-art instant messaging application.
  • How is the security and privacy of the Threema application?
    Threema is quite secure and complete. Thanks to its encryption system and its versatility and simplicity, it is one of the best private messaging applications in the world. No one apart from the sender and receiver of the message will be able to access the information. Enter and learn more.
  • If you have more questions, click on that link;
  • How does Threema.Work?
    Threema.Work is an encrypted messaging app designed especially for businesses. Its advanced yet easy-to-use features make it one of the most popular applications for organizations that want to protect their confidential information.
  • Can Threema.Work be hacked?
    No, Threema Work is one of the most secure and complete applications on the market. You will protect all the confidential information of your company.
  • What is the difference between Threema.Work and Threema?
    Although they are very similar in their operation, Threema Work is a more specialized application for organizations, as it allows users to be managed, define usage policies, separate or revoke identifications when there is a change of personnel, prevent former employees from accessing chats and manage lists of contact between others.
  • Documentation, Configuration, Resources, Downloads"
    Click her to see all instruction you need: https://work.threema.ch/en/faq
  • What devices are supported on Renati?
    Renati is currently offered on select Pixel devices: 3a, 3XL, 4a, 4XL. We will support more Pixels over time.
  • How is the device hardened?
    It all starts with our custom hardened kernel, removing developer option debugging capabilities and removing unneeded services by creating a minimalistic build to reduce the attack surface. Our proprietary OS doesn't use any third-party services. We were one of the first companies to implement a custom encrypted camera to prevent metadata associated with it to be stored to the filesystem unencrypted, and our private keyboard eliminates any information being sent to Googles servers. USB data, Bluetooth, fused location, GPS, and near-field communications are all gone.
  • How are OTA updates secure?
    Our updates are secure because the devices themselves have all been updated with the latest Android security patches. The OTA updates are seamlessly pushed to your device and available when you're connected to WiFi. OTA updates are vital as there's always new vulnerabilities that need to be patched. Further, most vulnerabilities target web browsers and JavaScript - which are completely removed in Renati. If the device you're using is on an older version of Android, then the device itself is suspectable to the new puck vulnerability. This allows an attacker to put in a Sim card that is locked (not possible with Renati) and bypass your lock screen and access the OS.
  • How does Renati MDM manage devices without an IMEI?
    Every Renati phone is assigned a unique user identifier - in our case a Username, based on a Universally Unique Identifier (UUID) token system. This UUID generates a one-of-a-kind identifier for each device upon initial activation. This approach prevents any malicious activity that could compromise the integrity of user data or expose sensitive information to unauthorized parties.
  • Do you have serverless architecture? Are you in the cloud?
    Serverless architecture doesn't exist. The cloud is just somebody else's computer. Can you have a phone without hardware?
bottom of page