You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.

Silent Phone and Security

Silent Phone uses Device-to-Device encryption technology, meaning only Silent Phone users exchange keys for each peer-to-peer call. The keys are not held on a server. Silent Phone uses the ZRTP protocol to encrypt the data packets of the phone call across the Internet. Silent Phone uses our secure Silent Network to facilitate the calling service and provide for complete security. 

You can visit our ZRTP page for an extensive and in-depth overview of the technology behind Silent Phone.

  • 193
  • 21-Aug-2018