Technology

State-of-the-Art Encryption Designed for Smartphones

How Our Message Encryption Works

The end-to-end message encryption process is designed to make messages accessible to only the devices participating in a conversation. Accordingly, even our servers do not have access to your plaintext messages or private keys. The process was developed for use in asynchronous mobile messaging environments and employs a system that continually generates new keys for new messages. This process of key generation and monitoring means that problems with keys are quickly detected and addressed and any compromise of a key will not compromise the security of the entire conversation, which can last for years in the mobile asynchronous context.

While this technology helps to protect the confidentiality of attorney-client messages, the underlying encryption process remains invisible to the user. The users have the option to verify the digital fingerprints of other users with whom they are communicating. As long as these digital fingerprints are verified, the users can feel secure knowing that the messages are encrypted.

You can learn more about the messaging encryption process here and here.

You can see a brief intro to how encryption works here.

How Our VoIP Encryption Works

The end-to-end VoIP encryption process is designed to make telephone communication secure so that only the participating parties can hear the contents of the conversation. The process uses a well known protocol, ZRTP, which was developed to secure VoIP communications and employs a system that generates new keys for new sessions. This process of key generation means that any compromise of a key will not compromise the security of the entire channel regardless of time.

While this technology helps to protect the confidentiality of attorney-client telephone calls, the underlying encryption process remains invisible to the user. For every new call, both participants will see a new two word string on the screen. As long as they both see the same two word string,  the users can feel secure knowing that the telephone communications are encrypted.

You can learn more about the VoIP encryption process here and here.

Our Implementation

Our system is based on publicly vetted open source encryption software built for smartphones. The open source software was primarily developed by Open Whisper Systems and our implementation uses unmodified open source libraries distributed at https://github.com/WhisperSystems/. We chose this software for its security and usability features, which match the needs of modern smartphone users. If you’d like to learn more, get in touch with us at support@northbot.com. We’d love to hear your questions.