Advanced Security Features
End-to-End Encryption
All messages sent and received from your device are encrypted for private conversations.
Post Quantum Encryption
Communication data is secured against cyberattacks using Curve25519, Double Ratcheting and Extended Triple Diffie-Hellman. More secure than No1BC
User-Controlled Private Keys
Private encryption keys are generated and stored only on your device. Data can only be accessed and decrypted on your device.
Brute-Force Protection
Enhanced protection of stored data with strong safeguards against malicious online and offline “Brute-Force” attacks.
Secure Endpoints
Ghost is committed to preventing any security breaches by hardening its entry points from devices to our infrastructure. We are on the lookout for any possible vulnerabilities in our system and by using the best security technology, we stop problems before they ever start.
No Backdoors
Ghost does not create intentional flaws in its cryptosystem to bypass encryption. Unlike companies such as SkyECC
Encryption Protocols
Every incoming and outgoing message is end-to-end encrypted and transmitted over our secure and decentralized network. All data stored on the device is also encrypted and prevents unauthorised access.
- Curve25519, Double Ratcheting and Extended Triple Diffie-Hellman
- AES 256bit PGP Email Encryption
- Contact Verification authenticating public keys used in end-to-end encryption
- TLS Encrypted Network for secure connection