Privacy policy

RAJ BRAZIL Desenvolvedores built the Mensagens Secretas app as an Ad Supported app. This SERVICE is provided by RAJ BRAZIL Desenvolvedores at no cost and is intended for use as is.

This page is used to inform visitors regarding our policies with the collection, use, and disclosure of Personal Information if anyone decided to use our Service.

If you choose to use our Service, then you agree to the collection and use of information in relation to this policy. The Personal Information that we collect is used for providing and improving the Service. We will not use or share your information with anyone except as described in this Privacy Policy.

The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at Mensagens Secretas unless otherwise defined in this Privacy Policy.

Information Collection and Use

For a better experience, while using our Service, we may require you to provide us with certain personally identifiable information. The information that we request will be retained by us and used as described in this privacy policy.

The app does use third party services that may collect information used to identify you.

Link to privacy policy of third party service providers used by the app

Log Data

We want to inform you that whenever you use our Service, in a case of an error in the app we collect data and information (through third party products) on your phone called Log Data. This Log Data may include information such as your device Internet Protocol (“IP”) address, device name, operating system version, the configuration of the app when utilizing our Service, the time and date of your use of the Service, and other statistics.

Cookies

Cookies are files with a small amount of data that are commonly used as anonymous unique identifiers. These are sent to your browser from the websites that you visit and are stored on your device's internal memory.

This Service does not use these “cookies” explicitly. However, the app may use third party code and libraries that use “cookies” to collect information and improve their services. You have the option to either accept or refuse these cookies and know when a cookie is being sent to your device. If you choose to refuse our cookies, you may not be able to use some portions of this Service.

Service Providers

We may employ third-party companies and individuals due to the following reasons:

  • To facilitate our Service;
  • To provide the Service on our behalf;
  • To perform Service-related services; or
  • To assist us in analyzing how our Service is used.

We want to inform users of this Service that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.

Security

We value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and we cannot guarantee its absolute security.

Links to Other Sites

This Service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by us. Therefore, we strongly advise you to review the Privacy Policy of these websites. We have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

Children’s Privacy

These Services do not address anyone under the age of 13. We do not knowingly collect personally identifiable information from children under 13. In the case we discover that a child under 13 has provided us with personal information, we immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact us so that we will be able to do necessary actions.

Changes to This Privacy Policy

We may update our Privacy Policy from time to time. Thus, you are advised to review this page periodically for any changes. We will notify you of any changes by posting the new Privacy Policy on this page.

This policy is effective as of 2020-06-30

Contact Us

If you have any questions or suggestions about our Privacy Policy, do not hesitate to contact us at contato@razjbrazil.com.

This privacy policy page was created at privacypolicytemplate.net and modified/generated by App Privacy Policy Generator

Would you like to support our work?

Please consider disabling your AdBlock to view our pages. Click here and see how. Or, if you prefer, consider a donation at the button below:

Requests

Would like to request a new feature or send a comment, then click here

Support or Complaint

Found a Bug on our page or would like to make a complaint, then click here



Data encryption
What is it and why is it so important?


Nowadays the term encryption or data encryption has been mentioned a lot, in different contexts and depths. This is mainly because, with the advancement of technologies, maintaining data security is becoming increasingly difficult. Data encryption is a great ally in protecting information and has been widely used by companies in order to keep their information and that of their customers more secure.

But after all, what does data encryption mean? Let's enjoy that you are here and try to explain what it is and what the encryption process is for.

Cryptography or cryptology (in Greek: kryptós, "hidden", and gráphein, "written") is the study and practice of principles and techniques for secure communication in the presence of third parties, called "adversaries". But generally, cryptography refers to the construction and analysis of protocols that prevent third parties, or the public, from reading private messages.

Protecting customer data has become a top priority for companies, especially after the entry into force of the General Data Protection Regulation (GDPR) - which was developed around a fundamental principle: protection of natural persons in relation to the treatment of personal data. your personal data.

In order to avoid the sanctions provided for in the law, to protect their reputation and, therefore, their business, companies will have to combat security breaches by adopting the necessary cybersecurity measures. Encryption of data and all confidential information is undoubtedly one of them.


Encryption types

Symmetrical

Symmetric encryption or secret key encryption uses the same key to encrypt and decrypt a message. Algorithms that use symmetric encryption are often faster, although this is not the most secure method for two reasons. First, it is necessary to have a secure sharing channel to exchange the secret key and the internet does not provide this security. Second, managing keys becomes more complicated as the number of people with whom the message is shared increases. Furthermore, symmetric encryption does not provide the possibility to verify the identity of the sender or receiver of the message in question.

Asymmetric

Asymmetric cryptography or public key cryptography uses a pair of distinct keys, one to encrypt the message and the other to decrypt it. The key to encrypt is known as the public key while the key to decrypt is known as the private key. This is the safest method for sharing messages on public channels like the internet. This is because only the public key is shared between the sender and the receiver, while the private key is used only to decrypt the message. It is important to note that in asymmetric cryptography we have the ability to know the user's identity, unlike symmetric cryptography.


Digital certificate

The digital certificate is an electronic record that acts as an identity card and is a way to avoid communicating with an imposter.

As seen earlier, in asymmetric cryptography the public key can be shared freely on the internet. Therefore, an impostor can create a false public key for your friend and send it to you. The moment you encode a message, you are actually encoding for the imposter. Having the corresponding private key, he will then be able to decrypt your message easily. The digital certificate acts to prevent these situations. It is composed of several data that characterize an entity that is then associated with a public key. The digital certificate can be issued to individuals, companies, equipment and even network services. In addition, as a Certification Body, it is also responsible for publishing information about certificates that are no longer trusted.

The major disadvantages of digital certificates are basically their cost, which involves not only their acquisition, but also their periodic renewal, and also the inconvenient bureaucracy involved in their issuance.


Encryption of data at rest

"At rest" data is data that is stored somewhere: on a mobile device, on a laptop, on a server or on an external drive, for example. When data is at rest, it is not being moved from place to place.

An example of encryption that protects data at rest is “full disk” encryption (also sometimes called “device encryption”). Enabling full disk encryption encrypts all information stored on a device, protecting it with a passphrase or other authentication method. On a mobile device or laptop, this usually looks like a normal lock screen, which requires a password, passphrase or fingerprint. However, locking your device (requiring a password to unlock it, for example) does not always mean that entire disk encryption is enabled.

Entire disk encryption can protect your devices from people who have physical access to them. This is useful if you want to protect your data from people who share an apartment with you, co-workers, employers, school officials, family members, spouses, police or other public administration or justice officials. It also protects data on your devices if they are stolen or lost, if you, for example, forget your phone on the bus or in a restaurant by accident.

There are other ways to encrypt data at rest. One option, called “file encryption”, encrypts only a few specific files on a computer or storage device. Another option is “drive encryption” (also known as “disk encryption”): all data in a storage area or on a device is encrypted.

You can use these different types of encryption at rest in a combined way. For example, suppose you want to protect sensitive information contained in your medical documents. You can use file encryption to separately encrypt a specific medical file stored on your device. Then, you can use drive encryption to encrypt the part of your device where this medical information is stored. Finally, if you have enabled full disk encryption on your device, everything - all medical information, as well as any and all files on your drive, including files on your computer's operating system - is encrypted.


Encryption of data on the go

"Moving" data is information being transported from one place to another on a network. When you send a message in a messaging app, for example, it leaves your device for the servers of the company that developed the app, and then for your recipient's device. Another example is browsing the web: when you access a website, the data from that website is transmitted from the website's servers to your browser.

It is important to check whether the conversations you have with your recipient are encrypted - and it is also important to know whether they are encrypted via transport layer encryption or end-to-end encryption.

Cryptography is not a cure for all ills. Even if you send encrypted messages, they will be decrypted by the person you are chatting with. If the tips (the devices you are using to communicate with) are compromised, then your encrypted conversations may also be compromised. In addition, the person you are talking to can take print screens off the screen or keep records of the communication between you.

If you encrypt data in transit, it will protect the content of your conversations, but it will not encrypt the metadata. For example, you can use encryption to shuffle messages between you and a friend, making them incomprehensible, but this does not hide:

  • that you and your friend are communicating.
  • that you are using encryption to communicate.
  • other types of information about your conversations, such as the location, time and extent of communication.

In addition, if you are the only person using encryption on a network, this metadata can be viewed as suspicious. That is why many crypto enthusiasts encourage everyone to use encrypted tools whenever they can: to normalize the use of encryption for those people who really need it.


Hackers X Encryption

The most common method of attack using encryption is brute force. This method consists of trying random keys until you hit the correct key. Any equipment that has access to the internet and that requires a username and password can be the victim of a brute force attack, such as e-mails. Therefore, it is important to know that the security of your key is directly proportional to its length. This is because the larger the key, the greater the number of possible combinations.


What can "Secret Messages" do for you?

Taking all this information into account, encrypting your data when it is on the move on the network and also when it is at rest on your device is ideal for protecting you from a wide range of potential risks. Especially with regard to personal documents, confidential data, images and / or videos of a private nature, etc.

For your data on the go.

If you make a habit of using the Secret Messages Web and Mobile solutions, ALWAYS encrypt your documents before sending them to your recipients, it will dramatically decrease that unauthorized people have access to or even create copies of this data .

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.

For your data at rest.

The Secret Messages Mobile solution offers the feature of a SAFE (password protected) that stores your files using our encryption technology. In this way, even if unauthorized people gain access to your device, it will be impossible for them to be able to read the content of your documents.

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.