Mobile Secret Messages & OnLine Tools

Why email is not a safe of communication?

Nowadays, with the evolution of communication technologies, thousands of documents pass through daily emails, many of which are sensitive or confidential documents. Despite the isolated efforts of some companies, even today, these messages are partially or totally unsafe.

In most cases, email messages are stored on their original server and transmitted without any encryption. Even in cases where your email provider offers encryption and local security, the same does not happen in the entire path that your message travels until it reaches its recipient. This path can mean up to dozens of servers and network structures.

In addition, we must also consider the fact that many companies and email providers make use of the content of their messages, for monitoring purposes and also for data collection, targeting targeted marketing. This only demonstrates the lack of privacy and the certainty that third parties will be able to access and even copy the contents of their emails.

How can I communicate more securely on the Internet?

Taking all this information into consideration, the Secret Message aims to encrypt your data. If you make it a habit to, using Web and Mobile (Android) solutions, ALWAYS encrypt your documents before sending them to your recipients, it will dramatically decrease the possibility that unauthorized people will have access to or even create copies of this data.

Our packaging technology makes it impossible to even discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.

The Mobile solution of Secret Messages, offers the feature of a SAFE (password protected) that stores your files using our encryption technology. This way, even if unauthorized people gain access to your device, it will be IMPOSSIBLE that they can read the content of your documents.


When starting our app for the first time, you will need to create your password, your identification name and choose the desired language.

First, access the Menu on the left side of the screen and open the Settings, as shown in the images. Then fill in the requested information and press the "Save" button. * Attention: When saving changes on this screen, depending on your Android version, the application can be closed automatically. Don't worry, this is normal. Now just open the app again from the main screen of your device.

Before starting to encrypt and decrypt messages, you will need to create KEYS.

The key is the code that will allow the encryption of messages and the identification of the recipient to decrypt them. The ideal is to create a key for each recipient, but you can also create keys for groups of recipients if you want more than one person to have access to that document.

To create a new key, in the menu (upper left side), go to Chaves and click the plus sign (lower right side).

Give the key a name (of the subject or recipient, for example) for identification. You can copy the key or share it directly from the application.

This key must be sent to the recipient, so that he can use it to decrypt your message. We recommend that, when sending the key, use a different means of communication than the one used to send the message. For example, if you send the encrypted message by email, send the password via Whatsapp; or if you send the message via Whatsapp, the key will send by SMS.

Now, to effectively encode a message, open the Menu again and select Encrypt.

In the bottom bar of the screen, you can select the option to encrypt Text, which can be entered at the moment within the application or copied from another location.

Beside, we have the option for Files (image, video, documents, etc.) that are on your device.

Finally, we have the option to Capture new photos and videos through the application's camera. In this case, photos are not automatically saved to the device's gallery.

In the case of files, it is possible to save them in the decrypted Vault (remembering that it will only be possible to access the application through your password), just select the image of the Vault. (As in the image below, left)

For image files and videos captured within the application, it is possible to view them decrypted, just select the Preview image. (as in the image below, on the right)

After selecting the original file, you must choose one of the keys already created to be the Decryption Key. Only this selected key will decrypt this file. (image below, left)

Finally, by selecting the button in step 3- to Encrypt File, you can Save, Email or Share the encrypted message in other applications. (image below, right)

Its encryption history lasts 24 hours and has a limit of 100 releases, after that amount, the oldest ones will be replaced by new releases and remain in the history until the end of 24 hours.

It is possible to delete the history before 24h, just swipe the item you want to delete (from right to left) until you see the word "Delete" at the bottom of the screen.

All files that you choose to save in the Vault will be saved there indefinitely (do not expire as the history).

Inside the Vault you can delete files or encrypt them again. Just access the Menu and select the Safe option.

When dragging the file to the RIGHT side of the screen, the option for encryption will appear and when dragging to the LEFT side, the option to delete will appear.

Finally, it is possible to view the Safe as a Grid (image on the left) or as a List (image to the right).

Would you like to support our work?

Please consider disabling your AdBlock to view our pages. Click here and see how. Or, if you prefer, consider a donation at the button below:


Would like to request a new feature or send a comment, then click here

Support or Complaint

Found a Bug on our page or would like to make a complaint, then click here

Data encryption
What is it and why is it so important?

Nowadays the term encryption or data encryption has been mentioned a lot, in different contexts and depths. This is mainly because, with the advancement of technologies, maintaining data security is becoming increasingly difficult. Data encryption is a great ally in protecting information and has been widely used by companies in order to keep their information and that of their customers more secure.

But after all, what does data encryption mean? Let's enjoy that you are here and try to explain what it is and what the encryption process is for.

Cryptography or cryptology (in Greek: kryptós, "hidden", and gráphein, "written") is the study and practice of principles and techniques for secure communication in the presence of third parties, called "adversaries". But generally, cryptography refers to the construction and analysis of protocols that prevent third parties, or the public, from reading private messages.

Protecting customer data has become a top priority for companies, especially after the entry into force of the General Data Protection Regulation (GDPR) - which was developed around a fundamental principle: protection of natural persons in relation to the treatment of personal data. your personal data.

In order to avoid the sanctions provided for in the law, to protect their reputation and, therefore, their business, companies will have to combat security breaches by adopting the necessary cybersecurity measures. Encryption of data and all confidential information is undoubtedly one of them.

Encryption types


Symmetric encryption or secret key encryption uses the same key to encrypt and decrypt a message. Algorithms that use symmetric encryption are often faster, although this is not the most secure method for two reasons. First, it is necessary to have a secure sharing channel to exchange the secret key and the internet does not provide this security. Second, managing keys becomes more complicated as the number of people with whom the message is shared increases. Furthermore, symmetric encryption does not provide the possibility to verify the identity of the sender or receiver of the message in question.


Asymmetric cryptography or public key cryptography uses a pair of distinct keys, one to encrypt the message and the other to decrypt it. The key to encrypt is known as the public key while the key to decrypt is known as the private key. This is the safest method for sharing messages on public channels like the internet. This is because only the public key is shared between the sender and the receiver, while the private key is used only to decrypt the message. It is important to note that in asymmetric cryptography we have the ability to know the user's identity, unlike symmetric cryptography.

Digital certificate

The digital certificate is an electronic record that acts as an identity card and is a way to avoid communicating with an imposter.

As seen earlier, in asymmetric cryptography the public key can be shared freely on the internet. Therefore, an impostor can create a false public key for your friend and send it to you. The moment you encode a message, you are actually encoding for the imposter. Having the corresponding private key, he will then be able to decrypt your message easily. The digital certificate acts to prevent these situations. It is composed of several data that characterize an entity that is then associated with a public key. The digital certificate can be issued to individuals, companies, equipment and even network services. In addition, as a Certification Body, it is also responsible for publishing information about certificates that are no longer trusted.

The major disadvantages of digital certificates are basically their cost, which involves not only their acquisition, but also their periodic renewal, and also the inconvenient bureaucracy involved in their issuance.

Encryption of data at rest

"At rest" data is data that is stored somewhere: on a mobile device, on a laptop, on a server or on an external drive, for example. When data is at rest, it is not being moved from place to place.

An example of encryption that protects data at rest is “full disk” encryption (also sometimes called “device encryption”). Enabling full disk encryption encrypts all information stored on a device, protecting it with a passphrase or other authentication method. On a mobile device or laptop, this usually looks like a normal lock screen, which requires a password, passphrase or fingerprint. However, locking your device (requiring a password to unlock it, for example) does not always mean that entire disk encryption is enabled.

Entire disk encryption can protect your devices from people who have physical access to them. This is useful if you want to protect your data from people who share an apartment with you, co-workers, employers, school officials, family members, spouses, police or other public administration or justice officials. It also protects data on your devices if they are stolen or lost, if you, for example, forget your phone on the bus or in a restaurant by accident.

There are other ways to encrypt data at rest. One option, called “file encryption”, encrypts only a few specific files on a computer or storage device. Another option is “drive encryption” (also known as “disk encryption”): all data in a storage area or on a device is encrypted.

You can use these different types of encryption at rest in a combined way. For example, suppose you want to protect sensitive information contained in your medical documents. You can use file encryption to separately encrypt a specific medical file stored on your device. Then, you can use drive encryption to encrypt the part of your device where this medical information is stored. Finally, if you have enabled full disk encryption on your device, everything - all medical information, as well as any and all files on your drive, including files on your computer's operating system - is encrypted.

Encryption of data on the go

"Moving" data is information being transported from one place to another on a network. When you send a message in a messaging app, for example, it leaves your device for the servers of the company that developed the app, and then for your recipient's device. Another example is browsing the web: when you access a website, the data from that website is transmitted from the website's servers to your browser.

It is important to check whether the conversations you have with your recipient are encrypted - and it is also important to know whether they are encrypted via transport layer encryption or end-to-end encryption.

Cryptography is not a cure for all ills. Even if you send encrypted messages, they will be decrypted by the person you are chatting with. If the tips (the devices you are using to communicate with) are compromised, then your encrypted conversations may also be compromised. In addition, the person you are talking to can take print screens off the screen or keep records of the communication between you.

If you encrypt data in transit, it will protect the content of your conversations, but it will not encrypt the metadata. For example, you can use encryption to shuffle messages between you and a friend, making them incomprehensible, but this does not hide:

  • that you and your friend are communicating.
  • that you are using encryption to communicate.
  • other types of information about your conversations, such as the location, time and extent of communication.

In addition, if you are the only person using encryption on a network, this metadata can be viewed as suspicious. That is why many crypto enthusiasts encourage everyone to use encrypted tools whenever they can: to normalize the use of encryption for those people who really need it.

Hackers X Encryption

The most common method of attack using encryption is brute force. This method consists of trying random keys until you hit the correct key. Any equipment that has access to the internet and that requires a username and password can be the victim of a brute force attack, such as e-mails. Therefore, it is important to know that the security of your key is directly proportional to its length. This is because the larger the key, the greater the number of possible combinations.

What can "Secret Messages" do for you?

Taking all this information into account, encrypting your data when it is on the move on the network and also when it is at rest on your device is ideal for protecting you from a wide range of potential risks. Especially with regard to personal documents, confidential data, images and / or videos of a private nature, etc.

For your data on the go.

If you make a habit of using the Secret Messages Web and Mobile solutions, ALWAYS encrypt your documents before sending them to your recipients, it will dramatically decrease that unauthorized people have access to or even create copies of this data .

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.

For your data at rest.

The Secret Messages Mobile solution offers the feature of a SAFE (password protected) that stores your files using our encryption technology. In this way, even if unauthorized people gain access to your device, it will be impossible for them to be able to read the content of your documents.

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.