Terms & Conditions

By downloading or using the app, these terms will automatically apply to you – you should make sure therefore that you read them carefully before using the app. You’re not allowed to copy, or modify the app, any part of the app, or our trademarks in any way. You’re not allowed to attempt to extract the source code of the app, and you also shouldn’t try to translate the app into other languages, or make derivative versions. The app itself, and all the trade marks, copyright, database rights and other intellectual property rights related to it, still belong to RAJ BRAZIL Desenvolvedores.

RAJ BRAZIL Desenvolvedores is committed to ensuring that the app is as useful and efficient as possible. For that reason, we reserve the right to make changes to the app or to charge for its services, at any time and for any reason. We will never charge you for the app or its services without making it very clear to you exactly what you’re paying for.

The Mensagens Secretas app stores and processes personal data that you have provided to us, in order to provide our Service. It’s your responsibility to keep your phone and access to the app secure. We therefore recommend that you do not jailbreak or root your phone, which is the process of removing software restrictions and limitations imposed by the official operating system of your device. It could make your phone vulnerable to malware/viruses/malicious programs, compromise your phone’s security features and it could mean that the Mensagens Secretas app won’t work properly or at all.

The app does use third party services that declare their own Terms and Conditions.

Link to Terms and Conditions of third party service providers used by the app

You should be aware that there are certain things that RAJ BRAZIL Desenvolvedores will not take responsibility for. Certain functions of the app will require the app to have an active internet connection. The connection can be Wi-Fi, or provided by your mobile network provider, but RAJ BRAZIL Desenvolvedores cannot take responsibility for the app not working at full functionality if you don’t have access to Wi-Fi, and you don’t have any of your data allowance left.

If you’re using the app outside of an area with Wi-Fi, you should remember that your terms of the agreement with your mobile network provider will still apply. As a result, you may be charged by your mobile provider for the cost of data for the duration of the connection while accessing the app, or other third party charges. In using the app, you’re accepting responsibility for any such charges, including roaming data charges if you use the app outside of your home territory (i.e. region or country) without turning off data roaming. If you are not the bill payer for the device on which you’re using the app, please be aware that we assume that you have received permission from the bill payer for using the app.

Along the same lines, RAJ BRAZIL Desenvolvedores cannot always take responsibility for the way you use the app i.e. You need to make sure that your device stays charged – if it runs out of battery and you can’t turn it on to avail the Service, RAJ BRAZIL Desenvolvedores cannot accept responsibility.

With respect to RAJ BRAZIL Desenvolvedores’s responsibility for your use of the app, when you’re using the app, it’s important to bear in mind that although we endeavour to ensure that it is updated and correct at all times, we do rely on third parties to provide information to us so that we can make it available to you. RAJ BRAZIL Desenvolvedores accepts no liability for any loss, direct or indirect, you experience as a result of relying wholly on this functionality of the app.

At some point, we may wish to update the app. The app is currently available on Android – the requirements for system(and for any additional systems we decide to extend the availability of the app to) may change, and you’ll need to download the updates if you want to keep using the app. RAJ BRAZIL Desenvolvedores does not promise that it will always update the app so that it is relevant to you and/or works with the Android version that you have installed on your device. However, you promise to always accept updates to the application when offered to you, We may also wish to stop providing the app, and may terminate use of it at any time without giving notice of termination to you. Unless we tell you otherwise, upon any termination, (a) the rights and licenses granted to you in these terms will end; (b) you must stop using the app, and (if needed) delete it from your device.

Changes to This Terms and Conditions

We may update our Terms and Conditions from time to time. Thus, you are advised to review this page periodically for any changes. We will notify you of any changes by posting the new Terms and Conditions on this page.

These terms and conditions are effective as of 2020-06-30

Contact Us

If you have any questions or suggestions about our Terms and Conditions, do not hesitate to contact us at contato@razjbrazil.com.

This Terms and Conditions page was generated by App Privacy Policy Generator

Would you like to support our work?

Please consider disabling your AdBlock to view our pages. Click here and see how. Or, if you prefer, consider a donation at the button below:

Requests

Would like to request a new feature or send a comment, then click here

Support or Complaint

Found a Bug on our page or would like to make a complaint, then click here



Data encryption
What is it and why is it so important?


Nowadays the term encryption or data encryption has been mentioned a lot, in different contexts and depths. This is mainly because, with the advancement of technologies, maintaining data security is becoming increasingly difficult. Data encryption is a great ally in protecting information and has been widely used by companies in order to keep their information and that of their customers more secure.

But after all, what does data encryption mean? Let's enjoy that you are here and try to explain what it is and what the encryption process is for.

Cryptography or cryptology (in Greek: kryptós, "hidden", and gráphein, "written") is the study and practice of principles and techniques for secure communication in the presence of third parties, called "adversaries". But generally, cryptography refers to the construction and analysis of protocols that prevent third parties, or the public, from reading private messages.

Protecting customer data has become a top priority for companies, especially after the entry into force of the General Data Protection Regulation (GDPR) - which was developed around a fundamental principle: protection of natural persons in relation to the treatment of personal data. your personal data.

In order to avoid the sanctions provided for in the law, to protect their reputation and, therefore, their business, companies will have to combat security breaches by adopting the necessary cybersecurity measures. Encryption of data and all confidential information is undoubtedly one of them.


Encryption types

Symmetrical

Symmetric encryption or secret key encryption uses the same key to encrypt and decrypt a message. Algorithms that use symmetric encryption are often faster, although this is not the most secure method for two reasons. First, it is necessary to have a secure sharing channel to exchange the secret key and the internet does not provide this security. Second, managing keys becomes more complicated as the number of people with whom the message is shared increases. Furthermore, symmetric encryption does not provide the possibility to verify the identity of the sender or receiver of the message in question.

Asymmetric

Asymmetric cryptography or public key cryptography uses a pair of distinct keys, one to encrypt the message and the other to decrypt it. The key to encrypt is known as the public key while the key to decrypt is known as the private key. This is the safest method for sharing messages on public channels like the internet. This is because only the public key is shared between the sender and the receiver, while the private key is used only to decrypt the message. It is important to note that in asymmetric cryptography we have the ability to know the user's identity, unlike symmetric cryptography.


Digital certificate

The digital certificate is an electronic record that acts as an identity card and is a way to avoid communicating with an imposter.

As seen earlier, in asymmetric cryptography the public key can be shared freely on the internet. Therefore, an impostor can create a false public key for your friend and send it to you. The moment you encode a message, you are actually encoding for the imposter. Having the corresponding private key, he will then be able to decrypt your message easily. The digital certificate acts to prevent these situations. It is composed of several data that characterize an entity that is then associated with a public key. The digital certificate can be issued to individuals, companies, equipment and even network services. In addition, as a Certification Body, it is also responsible for publishing information about certificates that are no longer trusted.

The major disadvantages of digital certificates are basically their cost, which involves not only their acquisition, but also their periodic renewal, and also the inconvenient bureaucracy involved in their issuance.


Encryption of data at rest

"At rest" data is data that is stored somewhere: on a mobile device, on a laptop, on a server or on an external drive, for example. When data is at rest, it is not being moved from place to place.

An example of encryption that protects data at rest is “full disk” encryption (also sometimes called “device encryption”). Enabling full disk encryption encrypts all information stored on a device, protecting it with a passphrase or other authentication method. On a mobile device or laptop, this usually looks like a normal lock screen, which requires a password, passphrase or fingerprint. However, locking your device (requiring a password to unlock it, for example) does not always mean that entire disk encryption is enabled.

Entire disk encryption can protect your devices from people who have physical access to them. This is useful if you want to protect your data from people who share an apartment with you, co-workers, employers, school officials, family members, spouses, police or other public administration or justice officials. It also protects data on your devices if they are stolen or lost, if you, for example, forget your phone on the bus or in a restaurant by accident.

There are other ways to encrypt data at rest. One option, called “file encryption”, encrypts only a few specific files on a computer or storage device. Another option is “drive encryption” (also known as “disk encryption”): all data in a storage area or on a device is encrypted.

You can use these different types of encryption at rest in a combined way. For example, suppose you want to protect sensitive information contained in your medical documents. You can use file encryption to separately encrypt a specific medical file stored on your device. Then, you can use drive encryption to encrypt the part of your device where this medical information is stored. Finally, if you have enabled full disk encryption on your device, everything - all medical information, as well as any and all files on your drive, including files on your computer's operating system - is encrypted.


Encryption of data on the go

"Moving" data is information being transported from one place to another on a network. When you send a message in a messaging app, for example, it leaves your device for the servers of the company that developed the app, and then for your recipient's device. Another example is browsing the web: when you access a website, the data from that website is transmitted from the website's servers to your browser.

It is important to check whether the conversations you have with your recipient are encrypted - and it is also important to know whether they are encrypted via transport layer encryption or end-to-end encryption.

Cryptography is not a cure for all ills. Even if you send encrypted messages, they will be decrypted by the person you are chatting with. If the tips (the devices you are using to communicate with) are compromised, then your encrypted conversations may also be compromised. In addition, the person you are talking to can take print screens off the screen or keep records of the communication between you.

If you encrypt data in transit, it will protect the content of your conversations, but it will not encrypt the metadata. For example, you can use encryption to shuffle messages between you and a friend, making them incomprehensible, but this does not hide:

  • that you and your friend are communicating.
  • that you are using encryption to communicate.
  • other types of information about your conversations, such as the location, time and extent of communication.

In addition, if you are the only person using encryption on a network, this metadata can be viewed as suspicious. That is why many crypto enthusiasts encourage everyone to use encrypted tools whenever they can: to normalize the use of encryption for those people who really need it.


Hackers X Encryption

The most common method of attack using encryption is brute force. This method consists of trying random keys until you hit the correct key. Any equipment that has access to the internet and that requires a username and password can be the victim of a brute force attack, such as e-mails. Therefore, it is important to know that the security of your key is directly proportional to its length. This is because the larger the key, the greater the number of possible combinations.


What can "Secret Messages" do for you?

Taking all this information into account, encrypting your data when it is on the move on the network and also when it is at rest on your device is ideal for protecting you from a wide range of potential risks. Especially with regard to personal documents, confidential data, images and / or videos of a private nature, etc.

For your data on the go.

If you make a habit of using the Secret Messages Web and Mobile solutions, ALWAYS encrypt your documents before sending them to your recipients, it will dramatically decrease that unauthorized people have access to or even create copies of this data .

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.

For your data at rest.

The Secret Messages Mobile solution offers the feature of a SAFE (password protected) that stores your files using our encryption technology. In this way, even if unauthorized people gain access to your device, it will be impossible for them to be able to read the content of your documents.

Our packaging technology makes it impossible even to discover the nature of encrypted information. That is, there is no way to know if the document was originally an image, a video, a .PDF file, etc.