| SECURE MESSAGING SCORECARD | ![]() |
Telegram | Signal | Fb Messenger | Skype | |
|---|---|---|---|---|---|---|
| Free service? | ![]() |
![]() |
Freemium | ![]() |
![]() |
![]() |
| VoIP calls | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| P2P: No Cloud, No Leak, No Metadata | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Encrypted screen (screen lock) | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Encrypted in transit? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Encrypted on disk? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Can you verify contacts identities? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Are messages secure if your keys are stolen? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Are VoIP calls as secure as chat messages? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Self destruct messages? | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
| Source https://www.eff.org/secure-messaging-scorecard | ||||||
End-to-end Encryption in Transit:
StealthChat uses end-to-end encryption technology to encrypt your messages, files and calls in transit. This provides an additional layer of protection over industry standard SSL/TLS. The end-to-end encryption means that only you and the receiver can read them. Each session is encrypted with a unique key pair and in the extreme event that your connection is monitored the data still cannot be decrypted. The message encryption is based on the "Off-the-record" (OTR) Messaging protocol:
https://en.wikipedia.org/wiki/Off-the-Record_MessagingThe Voice Over IP (VoIP) encryption is based on the Secure Real Time Transport (SRTP) protocol:
https://en.wikipedia.org/wiki/Secure_Real-time_Transport_ProtocolStealthChat automates the end-to-end key exchange when the communication session is initiated and the keys are used to encrypt calls, chats and files. Unlike some other "secure" apps, StealthChat encrypts all communication to ensure that unencrypted information cannot be exchanged inadvertently.
Encrypted Display:
StealthChat provides a unique and optional screen encryption. Information on the StealthChat screen can be set to switch to encrypted mode. The screen is encrypted after a timeout period or after the app is sent to the background. The encrypted screen mode can be unlocked with a password, with a picture lock or with TouchID. This feature protects against "shoulder surfing" where somebody looks over your shoulder or picks up your phone when the device is unlocked. The Encrypted Display prevents unauthorized users from viewing your message history or who you have been talking with.
Encrypted Data on Disk:
StealthChat stores your message history securely on disk using industry best practices including AES/EAX encryption using a PBKDF derived password. In addition, you can set a burn timer for your messages, after which they are deleted from disk on your device and your friend's device.
What is StealthChat?
StealthChat is a secure chat and phone application. It allows you to have secure, unfiltered, off-the-record conversations and phone calls. It allows you to speak freely without the risk of your communication being intercepted, forwarded on or permanently stored.
What devices is StealthChat supported on?
Are my messages encrypted?
Yes! All messages, calls and files in StealthChat are fully encrypted. We employ end-to-end encryption to ensure conversations remain confidential and are private to you and your friend. Furthermore, the encrypted messages are sent over a connection that is SSL encrypted!
How do I decrypt the screen on StealthChat?
In encrypted mode, press and hold anywhere on the screen to show the screen unlock.
How do I change my picture unlock on StealthChat?
Go to Settings > Security Settings > Screen Lock.
I forgot my Password. What can I do now?
Lost Passwords cannot be recovered. However, you can reset/uninstall the app and then set it up again. On Android delete the app data by going to Phone Settings > Apps > StealthChat > Clear data.
How do I start a chat?
In the Contacts screen, tap on your friend then wait until the key exchange completes.
Is my VoIP secure and encrypted like my messages on StealthChat?
Yes! StealthChat VoIP calls are fully encrypted like StealthChat messages.
How do I make a VoIP call on StealthChat?
How do I create a Group Chat?
Note : To add new participant, you have to start a chat (exchanging key with a contact) before invite them to a group chat.
Do you have a problem with, or a question about StealthChat? Please fill in the form below and we'll get back to you as soon as possible. Please make sure to read the FAQ before sending a support request.
We ask you to refrain from sending questions about the planning or availability of new features.
Send Message?
For more information on StealthChat please email marketing@stealthchat.com
StealthChat Press Releases(
pdf)
StealthChat Fact Sheet(
pdf)
StealthChat Reviewers Guide For Android(
pdf)
StealthChat Reviewers Guide For iOS(
pdf)
Rockliffe Systems ("Rockliffe") makes information and products available on this web site, subject to the following terms and conditions. By using the accessing this site, you agree to be bound by these terms and conditions. Rockliffe reserves the right to change these terms and conditions, and the products, services, prices, and programs mentioned in this site at any time, at its sole discretion, without notice. Rockliffe reserves the right to seek all remedies available by law and in equity for any violation of these terms and conditions. Any rights not expressly granted herein are reserved.
StealthChat and the information on this web site are protected by copyright. Except as specifically permitted, no portion of StealthChat or this web site may be distributed or reproduced by any means, or in any form, without Rockliffe’s prior written permission. For more information about obtaining permission, please email legal@stealthchat.com
StealthChat is protected by the following US patents:
Stealth, StealthChat, Stealth Communicator and Stealth Messenger are registered Trademarks of Rockliffe Systems.
StealthChat and the accompanying documentation available to download from this site are the copyrighted work of Rockliffe. Use of the software is governed by the terms of the end user license agreement, which accompanies such software. If no license accompanies the download, the terms of the license which accompanied the original product being updated will govern. You will not be able to use, download, or install any software unless you agree to the terms of such end user license agreement.