How We Made SKY ECC The Most Secure Phone Available

SKY ECC was built assuming that everything involved with the phone’s security was compromised and that we must secure them—no assumptions allowed. This is our zero-trust security model and it underpins every part of SKY ECC from devices to servers. Click to learn about: Secure Environment checks Brute force protections Metadata and header encryption Push … Read more

Billions Of Devices Vulnerable To SIMjacking—But Not Ours

Putting remotely executable apps on SIM cards seemed like a good idea at the time Last week we learned about a truly horrifying exploit known as SIMjacking can track your location without you knowing it via a stealthy text message that you’d likely never see in your messages—and that’s just the not-so-bad part. It only … Read more

How to Delete Telegram Automatically or Manually in a Few Easy Steps

People are becoming aware of Telegram’s growing list of security issues, want to delete Telegram, and upgrade to a more secure chat app. You’ll learn how to delete Telegram with self-destruct settings, how to delete Telegram manually, a tip on exporting data before deleting Telegram, and then look at a much more secure chat app. … Read more