Security

Security Features

Industry leading technology

Regardless of how unimportant you think your data is, someone out there may attempt to steal it and use it against you. Our system values your security above all else and we are committed to ensuring your privacy at all times using the strongest encryption algorithms available.

icon-sec-img07

No Backdoor

There is no “secret entrance” or method that would allow anyone to access your secure data with our system. When we say there is no way for anyone else to access your data but you, we mean it.

icon-sec-img06

Secure Endpoints

We stay on top of any potential threats by maintaining secure endpoints. With Ghost, you never have to worry about potentially dangerous individuals penetrating our system, we prevent them from ever coming close to any user data.

icon-sec-img03

Perfect Forward Secrecy

Unique ephemeral encryption keys provide security for all calls and messages sent and received by your device.

secure-endpoints

End-to-End Encryption

From your device to your recipient’s, messages are completely secure. There is no way for anyone to view your private communication, no matter how hard they may try.

double-rat-chat-img

Double Ratchet Algorithm

Key Exchange utilizes the Double Ratchet Algorithm which combines the cryptographic ratchet based on the Diffie-Hellman key exchange and a ratchet based on the key derivation function.

user-controlled-keys

User Controlled Keys

All communications are secured by your unique encryption key owned by the user. Private keys are generated and only stored on the user’s device.

argon2

Maximum Password Attempt Limit

Limit the number of incorrect password attempts to keep your data protected in case you lose your device or someone attempts to gain access to your information.

end-to-end

Independently Audited

With constant independent expert oversight, we are certain that our system is as secure as it can possibly be. We frequently have our protocols peer reviewed by leading industry experts and constantly upgrade our systems to improve the security of our users.

Cybercrime Happens Every Day

Many people undervalue their personal information. However, thieves see the value in this information and thus, cybercrime has become an extremely common problem in the world today. As your reading this right now, someone is having their identity stolen by a cybercriminal.

Encryption means that your information will remain private. Any encrypted messages you send will only be seen by your intended recipient and no one else.

Borrowing from the leaders in cryptography and security around the world, Ghost has created a unique secure system that encompasses both PGP and Elliptical Curve Cryptography that is second to none.

Post Quantum Encryption

Communication data is secured against cyberattacks using 521bit ECC, Double Ratcheting and Extended Triple Diffie-Hellman.

Argon2

With Argon 2, hackers have no way of guessing passwords by using multiple, parallel rounds of memory and computer hashing which prevents any cyberattacks.

Contact Verification

Protect against Man-In-The-Middle attacks by verifying the identity of new contacts and authenticating their keys used for end-to-end encryption.

Protect your data today

Protect your personal data and security today with the strongest encryption and security safeguards implemented by our infrastructure