Easyphonia | ENCRYPTION
page-template-default,page,page-id-16990,ajax_fade,page_not_loaded,,qode-content-sidebar-responsive,qode-theme-ver-16.9,qode-theme-bridge,disabled_footer_bottom,qode_header_in_grid,wpb-js-composer js-comp-ver-5.5.5,vc_responsive



EasyPhonia end-to-end communication channel uses AES 256-bit (Advanced Encryption Standard) encryption algorithms with keys generated according to the Diffie-Hellman protocol (with support for 571-bit elliptical curve encryption) for each single phone call. These keys are destroyed immediately at the end of the phone conversation. EasyPhonia negotiates keys in peer-to-peer mode, therefore, network operators do not have access to the keys.


EasyPhonia key continuity authentication and tamper detection features enjoy selfrepair properties to protect against MiTM (Man-in-the Middle) attacks.

The value of an idea lies in the using of it. Thomas A. Edison