Full Anonymity

Secure Call does not require your personal information such that your phone number, your e-mail address or any kind of your membership. In this way, it becomes impossible to determine user's true identity. You can make encrypted secure voice calls by completely remaining anonymous thanks to one-time generated Secure Call number that is generated during application installation.

Full Independent Company

Implementing and operating communication technologies requires high costs. It's very natural to questionate free messaging and voice call services for possibility of generating revenue from the user data. All the costs of services which we provide to you are covered by user subscriptions. Our company gets all power from it's user base and has no affilities with any kind of governments or organizations.

High Encryption Technology

Secure Call provides a secure way that all user calls are performed directly between users thanks to peer-to-peer (P2P) architecture and military grade encryption. Secure Call has no fixed encryption key and all encryption keys generated automatically for each calls. Asymmetric key exchange mechanism is used to exchange encryption keys between only relevant call participants.

SECURE CALL

Anonymous, peer-to-peer (P2P), end-to-end encrypted voice calling application for iPhone and Android smartphones.

  • Innovative Phone Numbering System

    Secure Call users in every corner of the world, unlike complicated phone numbering systems, can perform encrypted voice calling by dialing fewer numbers through innovative numbering system.

  • User Friendly Interface

    Instead of complicated user interfaces, hard questions, never ending registration processes, you can simply install Secure Call application and immediately make encrypted voice calls with accustomed user interfaces.

  • Minimal App Permissions

    Secure Call does not need to access your sensitive informations (phone number, IMEI number, location information, photos, contacts, SMS sending/receive etc.) that can be used to reveal your true identity.

  • Multi Platform

    Secure Call runs on iPhone and Android platforms and strictly follows each platform's design guidelines to boost user experience.

  • HD Voice Call

    Secure Call can provide crystal-clear, encrypted voice calls even with 2G connections.

  • 24/7 Support

    All questions and suggestions of our users are responded by our technical support team through 24/7.

TECHNOLOGY

Peer-to-Peer (P2P) Communication

Other communication services usually operates with client-server architecture that requires each user has to send it's communication data to one of service servers, and that server is responsible to relay communication data to other party. Due to this model, other service providers could backup, process and even sell your communication data to third parties without even you notice that. To protect the privacy of your communication data, Secure Call service servers only bring caller and callee together. After that, all communication data are exchanged directly between caller and callee.

End-to-End Encryption

Most communication applications transmit communication data without any encryption at all. Some applications use SSL/TLS at best for only transmitting control commands to the servers and leaving user communication data as unencrypted. Secure Call use TLS for transmitting metadata (e.g. call requests) to Secure Call servers and end-to-end encryption for transmitting user communication data (e.g. user voice) to other users. TLS ensures industry standard access to our servers. On the other hand, end-to-end encryption ensures that only the people communicating could know encryption keys. Because of this, only the people communicating know how to decrypt communication data. And no one can access the cryptographic keys needed to decrypt the conversation, including even Secure Call engineers. What's more even an authority would demand to hand-over communication data, there is no way to supply decrypted communication data.

Minimal App Permissions

Some applications require too much permissions including but not limited to access phone number, IMEI number, contacts, photos, location, call history, SMS etc. By fully utilizing those permissions, it's piece of cake to reveal someone true identity and his personal details. Secure Call completely eliminates such things by requiring minimal app permissions for a voice calling app. Secure Call requires to access microphone for capturing your voice during calls, access to Internet for transmitting your voice to other participant. Secure Call even has it's own contacts list to avoid reading your contacts.

Surveillance and Tampering-Proof

Secure Call tries to best possible combinations to make sure user communications are surveillance and tampering-proof. To put it short:

  • Peer-to-peer communication avoids transmitting user data to known IP addresses and ports. This eliminates packet capturing by defining known IP addresses and ports.
  • End-to-end encryption avoids even Secure Call engineers to listen user conversations. Technically speaking, this approach eliminates that any authority demands for handing-over user communication data.
  • Minimal app permissions provides full anonymity. Due to minimal permissions, Secure Call cannot collect any information which could be used to reveal true identity of a Secure Call account.

Your data are belong to you. Not us.

Unlike other communication applications, Secure Call does not need to access your sensitive informations (phone number, IMEI number, location information, photos, contacts, SMS sending/receive etc.) that can be used to reveal your true identity. 

FAQ

Of course you do. We've got answers! We've collected frequently asked questions

How does Secure Call achieve full anonymity?

Secure Call does not require your personal informations such that your phone number, your e-mail address or any kind of your membership. In this way, it becomes impossible to determine user's true identity. You can make encrypted secure voice calls by completely remaining anonymous thanks to one-time generated Secure Call number that is generated during application installation.

Could you decrypt my voice calls, for example if you were required to by law enforcement?

No, that is impossible. All voice call data are end-to-end encrypted through peer-to-peer architecture. Since we don't have the secret keys of our users we cannot decrypt your voice calls (your secret key never leaves your device and generated for each calls). Prior to actual voice data transfer starts (i.e. when a user intent to call someone), our servers need to know caller and callee to start peer-to-peer voice call. But, after voice call is started, all voice communication data are transmitted through peer-to-peer architecture. So, we cannot even know what was transmitted.

Will my address book data be sent to Internet?

No. To able to increase privacy level, we do not synchronize your address book with any devices, servers or cloud services. More over, due to our limited app permissions, we even cannot access your phone contacts. You have to manually edit your Secure Call contacts due to this limitations.

What is the benefit of Secure Call numbering system?

Secure Call users in every corner of the world, unlike complicated phone numbering systems, can perform encrypted voice calling by dialing fewer numbers through innovative numbering system.

SUPPORT & FEEDBACK

Of course you do. We've got answers! We've collected frequently asked questions.

 

24/7 Support

Do you need help using Secure Call? Or do you have something you want us to know? We're happy to help!

Feedback

Voice your suggestions, wishes and criticism here. We appreciate your feedback. We apologize that we may not be able to provide individual responses.

 

Contact Us

BLOG

Follow our developers, learn upcoming improvements early.

Why does Secure Call require minimal app permissions?

Sometimes people ask us "Why I cannot reuse my phone's contacts in Secure Call like any other apps?" or "Why does my Secure Call number changes after reinstall?". All of these questions actually related to app permissions. We always wanted full anon…

Read More

CONTACT

Do you have a question about our services? Please use one of the methods below to contact us.

E-Mail Address

n+GzcCCx2pEVYnvJyumNZDx1PqXrcMEoUg==

or

Contact Form