Home Print Secure Login Register 0   

 General Information

 

Introduction

Who is it for?

Why use SecureGSM Products?

Refund Policy

End User Licence Agreements

Statement on software piracy

 

 In-Confidence
for iPhone & iPad
Next Generation Telephony

 

Features

Advanced Features

System Requirements

Screenshots

 

 In-Confidence
for Windows
Next Generation Telephony

 

Features

Advanced Features

System Requirements

Screenshots

Signature Verification Tool

 

 Resources

 

Reference & Literature

Online User Guides

Technical Articles

 

 SecuStream™ Technology

 

Under the hood of SecureGSM™

 

------------------------------------------------------------------------------------------------------------------------------------
SecureGSM™
In-Confidence

Next generation encrypted voice, messaging and conference.
------------------------------------------------------------------------------------------------------------------------------------

For iPhone & iPad

  • Unprecedented security, with intuitive ease of use
  • SecureGSM's famous triple cipher encryption module (true military grade security)
  • Crystal clear, echo-free voice calls
  • Speakerphone compatible
  • Point-to-point encrypted voice calls
  • Multi-party encrypted conferencing
  • Encrypted, verified multi-language enabled messaging
  • Integrated contacts manager with search functionality
  • Intuitive, easy to use graphical user interface
  • Closed Group capabilities
  • Robust party verification procedures

No Compromise Encrypted Telephony

In-Confidence is SecureGSM's next generation product designed to deliver our famous triple-layer encryption to Internet Telephony (Voice over IP - VoIP) communications.

In-Confidence boasts an unparalleled level of security combined with state-of-the art, echo-free audio quality. But what sets In-Confidence apart from the competition is that it is the only dedicated multi-party conferencing product with triple layer encryption capabilities.

These unique features combine to make In-Confidence the most user-friendly encrypted telephony application with a no-compromise security model.

[Find out more] [Downloadable Brochure] [Buy now]

------------------------------------------------------------------------------------------------------------------------------------
SecureGSM™
In-Confidence

Next generation encrypted voice, messaging and conference.
------------------------------------------------------------------------------------------------------------------------------------

For Windows

  • Secure Voice
  • Secure Messaging
  • Secure Multi-Party Conference
  • Military Grade Encryption

No Compromise Encrypted Telephony

In-Confidence is SecureGSM's next generation product designed to deliver our famous triple-layer encryption to Internet Telephony (Voice over IP - VoIP) communications.

In-Confidence boasts an unparalleled level of security combined with state-of-the art, echo-free audio quality using SpiritDSP's highly applauded TeamSpirit® Voice Engine. But what sets In-Confidence apart from the competition is that it is the only dedicated multi-party conferencing product with triple layer encryption capabilities.

These unique features combine to make In-Confidence the most user-friendly encrypted telephony application with a no-compromise security model.

[Find out more] [Downloadable Brochure] [Buy now]

------------------------------------------------------------------------------------------------------------------------------------
Safe with SecureGSM
------------------------------------------------------------------------------------------------------------------------------------

With the recent information coming out into the media about NSA's Campaign against encryption, we wish to assure our customers that SecureGSM products do not and never have used Dual_EC_DRBG in any of our products.

------------------------------------------------------------------------------------------------------------------------------------
NSA surveillance: Merkel's phone may have been monitored 'for over 10 years'
------------------------------------------------------------------------------------------------------------------------------------

Kevin Rawlinson and agencies. The Observer, Sunday 27 October 2013
As German officials prepare to travel to the US, Der Spiegel cites a previously secret NSA document

New claims emerged last night over the extent that US intelligence agencies have been monitoring the mobile phone of Angela Merkel. The allegations were made after German secret service officials were already preparing to travel to Washington to seek explanations into the alleged surveillance of its chancellor. [more...]

------------------------------------------------------------------------------------------------------------------------------------
The Many Flaws of Dual_EC_DRBG
------------------------------------------------------------------------------------------------------------------------------------

Matthew Green, September 18, 2013.
Update 9/19: RSA warns developers not to use the default Dual_EC_DRBG generator in BSAFE. Oh lord.

As a technical follow up to my previous post about the NSA's war on crypto, I wanted to make a few specific points about standards. In particular I wanted to address the allegation that NSA inserted a backdoor into the Dual-EC pseudorandom number generator. [more..]

------------------------------------------------------------------------------------------------------------------------------------
NSA slides explain the PRISM data-collection program
------------------------------------------------------------------------------------------------------------------------------------

Washington Post, June 6, 2013. Through a top-secret program authorized by federal judges working under the Foreign Intelligence Surveillance Act (FISA), the U.S. intelligence community can gain access to the servers of nine Internet companies for a wide range of digital data. Documents describing the previously undisclosed program, obtained by The Washington Post, show the breadth of U.S. electronic surveillance capabilities in the wake of a widely publicized controversy over warrantless wiretapping of U.S. domestic telephone communications in 2005. These slides, annotated by The Washington Post, represent a selection from the overall document, and certain portions are redacted. [more..]

------------------------------------------------------------------------------------------------------------------------------------
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
------------------------------------------------------------------------------------------------------------------------------------

Washington Post Investigations.The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post. [More...]

------------------------------------------------------------------------------------------------------------------------------------
Are all telephone calls recorded and accessible to the US government?

A former FBI counterterrorism agent claims on CNN that this is the case
------------------------------------------------------------------------------------------------------------------------------------

The Guardian, May 4, 2013. The real capabilities and behavior of the US surveillance state are almost entirely unknown to the American public because, like most things of significance done by the US government, it operates behind an impenetrable wall of secrecy. But a seemingly spontaneous admission this week by a former FBI counterterrorism agent provides a rather startling acknowledgment of just how vast and invasive these surveillance activities are. [more...]

 

Copyright ©2004 - 1412 SecureGSM

Home   About us   Contact us   News   FAQ   Recover Password   Privacy Policy   Terms & Conditions