About our services and security
Why trust CryptTalk?
Our security philosophy
Learn more about our
Our security philosophy
Discover how CryptTalk makes your communication completely secure.
Download White Paper (PDF)
NCC review details
Learn about the CryptTalk Mobile
Application Security Assessment
by NCC Group.
See CryptTalk's main features.
Open brochure (PDF)
See how our customers
from various sectors
benefit from using CryptTalk.
Read Case Studies
Support Center &
Frequently Asked Questions
Got any questions? Go to our Support Center for assistance or to submit a question.
Open Help Center
Press resources and some media coverage
Interview with the founders
Szabolcs Kun and Attila Megyeri, co-founders, tell their story.
Why we do this?
A deeper insight about us
We believe that your personal privacy matters a great deal.
CryptTalk video spot
A short introduction to CryptTalk.
Scaling a security startup in the
aftermath of Snowden
"Maximum possible security
when compared to others."
But, aside from the marketing
spiel, how good is CryptTalk?
"Indeed, few companies do not have back doors, CryptTalk thus only has two or three competitors in the very secure segment."
CryptTalk for Journalists
(Interview by GEN)
We are committed to support investigative journalism and the protection of free speech.
Read the interview
For specific inquiries, please email us at: firstname.lastname@example.org
Reports and articles about surveillance
We have collected you useful articles and reports about surveillance and eavesdropping.
Vodafone outlines government
efforts to censor telecoms
Vodafone Law Enforcement Disclosure
report Country-by-country legal annexe.
Authority requests for access to electronic
communication (country data).
Bugged, Tracked, Hacked
A 60 Minutes Special Investigation
German hackers intercept and record mobile phone conversations between a 60 Minutes reporter in Europe and an Independent Australian Senator, Nick Xenophon, in Australia's Parliament House.
Watch the report
FORBES on governmental
"Statistics on how often your phone company hands data over to law enforcement."
Keys Under Doormats
Mandating insecurity by requiring
government access to all data and
articles and reports
See our collection of articles
on interception and surveillance.
For our users
For individual users subscribing
through the App Store℠.
For business users
with corporate subscription.
of our service
Master Service Agreement