Frequently Asked Questions
Why choose Ghost?
Ghost believes we have a right to digital privacy. We believe in secure communications to protect your privacy. Our platform is user-friendly with security as a priority and go above and beyond to provide more than just end-to-end encryption.
What can i store in Ghost Vault?
Ghost Vault can store personal notes, photos, video, voice notes and chat messages protected using AES-256 encryption within Ghost’s encrypted container. Ghost Vault is designed with simplicity to keep your personal notes and multimedia organized with folders. All items in your vault can easily be shared to your contacts as well as being able to securely import data from your chats to your vault.
What is an anonymous group chat?
Anonymous group or ghost group is a securely created group chat where contacts are given a randomised alias used in that group for the purpose of extra privacy
Can I backup my Ghost data?
Yes, you can choose to schedule an encrypted backup of your contacts and notes. This backup will be stored on Ghost’s secure servers and will be password protected using industry standard AES-256 encryption.
Do you have a backdoor?
No. Ghost believes in the right of digital privacy and does not have a backdoor to your data. All private encryption keys are stored on your device and do not leave your device ever for the privacy and security of your communications.
Does Ghost have access to my data?
Definitely not. Ghost cannot and does not have access to your data. All communications are secured for you and your intended recipients. This includes all messages, emails, sensitive data stored and any calls between your contacts
What are the terms of using Ghost?
If I stop using Ghost, when does my account get deleted?
Your account will be deleted 14 days after your subscription has ended. Once deleted the account cannot be recovered and all relevant information to your account will be permanently erased.
Become a partner
Partner with a security-minded team that focuses on protecting the privacy of users from the never-ending threat of cyber criminals