news

StealthTalk

StealthTalk

StealthTalk Safe. Private. Professional

StealthTalk is a private messenger designed to meet the high demands of business- and privacy-conscious professionals. Based on a patented SDNP protocol developed for professional telecommunications use, StealthTalwingo onlinek bridges the gap between professional and consumer security solutions.

KEY FEATURES

Secure voice calls

Make secure calls with exceptional voice quality even at slow Internet connection speeds based on professional communications standards TETRA and SDNP protocol.

Secure Messaging

Exchange true end-to-end encrypted messages with all encryption and decryption of sensitive message data occurring entirely on the user's device.

Self-destruct messages

Send confidential messages that are automatically deleted after a selected period of time.

Modo Stealth

Protected secret environment for confidential calls and messages that require users to enter their password to view messages or receive calls.

PRIVACY AND SECURITY

End-to-end encryption

All communications within StealthTalk are always protected with end-to-end encryption powered by a patented SDNP protocol that uses ECC 512, AES 256 and SHA-3 512 as primitives.

Zero knowledge proof

StealthTalk knows nothing about the content of your messages or calls. User data is not collected or stored on StealthTalk servers and may not be analyzed, sold or disclosed.

Professional Telecommunications Technology

StealthTalk communications security is based on the patented, tried and field-tested SDNP protocol developed and used in professional telecommunications.

PERMISSIONS REQUIRED

StealthTalk requires the following permissions to provide its private messaging services and ensure that all features are operational.

• Contacts: Contacts permission is used to match you with your contacts using phone number hashes. StealthTalk does not monetize, collect, or store your address book data.

• Microphone: Microphone access is required to make secure voice calls.

• Bluetooth and location: Bluetooth and location access are required to locate devices near you and enable encryption key exchange.

• Camera: Camera access is required to add new contacts via QR code and send photos with the built-in camera.

• Storage: Storage access is required to store images and files received in chats.

For additional information and suggestions, please contact [email protected]

rummy wealth 41