https://play.google.com/store/apps/details?id=com.wikimediacom.clipboard.encrypt
1. Why do I need to encrypt?
I often need to transmit sensitive information, personal information on the network. But often SMS, eMail is not encrypted transmission, that is, this information will be exposed to the transmission.
In addition, my common Messenger, Facebook, WhatsApp, Wechat, Line, Telegram dialogue information is operator control, that is, personal conversation information is a risk of leakage.
I often need to store sensitive information and personal information on my mobile phone. But these files are stored in plain text, that is, they will be exposed to risk.
2. What is Clipboard Encrypt
A tool to encrypt and decrypt sensitive information, all apps can use it when editing text.
3. How to use Clipboard Encrypt
The usage is very simple, set the password for encryption and decryption, after opening the function:
* If it is plain text: long press text -> select text -> copy -> paste to achieve encryption
* If it is ciphertext: long press text -> select text -> copy -> paste to achieve decryption
* The ciphertext looks like {{ciphertext}}
4. When to use Clipboard Encrypt
* The SMS sender and receiver agree on the password, the sender encrypts when composing, and the receiver decrypts after receiving the message.
* The eMail sender and receiver agree on the password, the sender encrypts when composing, and the receiver decrypts after receiving the message.
* The sender and receiver of the Messenger agree on the password, the sender encrypts when composing, and the receiver decrypts the message after receiving it.
* Encrypt when composing text, decrypt when restoring text
5. Is Clipboard Encrypt safe?
Clipboard Encrypt uses the standard AES encryption algorithm.
It uses AES with a random salt and random IV. The salt and IV (which are not considered sensitive information) are saved at the beginning of the data.
6. What is AES
AES is based on a design principle known as a substitution–permutation network, and is efficient in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits.
Related
I was looking for an application that would encrypt and decrypt SMS, so that the carrier, or anyone else listening in, would be unable to monitor SMS traffic. To be clear, I am referring to a shared key system for SMS traffic, not encryption of saved messages.
The real question seems to be, could a plugin be created for GO SMS or even the stock msg app that would allow this feature. It would be important to make encryption strong ENOUGH without increasing the size too much like PGP would. Also, one must consider the original developers of GO SMS (Asian dev team) and the right to create plugins for their software.
Any ideas?
play.google.com/store/apps/details?id=com.kstych.SecureIM
Do you care if your messages are scanned/read/provided to the highest bidder or the authorities without ever asking or even notifying?
SecureIM is the first Secure-Chat application which is built to protect you from any possible or potential leak of privacy. These days organizations spy on our chats to target ads and Governments in the name of security, however there is no excuse of not demanding and having access to privacy when we want.
SecureIM secures your communication in 2 ways
1. Secure Transmission :- A chat message will be encrypted and only readable on the device it is sent to/from.
2. Single Use Keys :- The Keys generated while messaging are discarded when the application is closed, which means it is impossible to decode a message once the app is reloaded.
The application is extremely simple to use, no need to bother about the complexities of encryption and underlying privacy details, rest assured your messages will always be out of reach from snoopers.
This app uses Public Key Cryptography, each session generates its own private/public keys.
Keys are never stored but kept in memory until the app is running.
So it'll support XMPP?
Or just gtalk?
supports xmpp
Sleepy! said:
So it'll support XMPP?
Or just gtalk?
Click to expand...
Click to collapse
yes, the app uses XMPP below the encryption layer, and so any XMPP server is supported, however this version is binded to login to Google talk server
Thanks
Hufu is a next generation encrypted messenger that combines best-in-class message encryption seamlessly with an intuitive user interface. Unlike the mainstream encrypted messaging applications, Hufu encrypted messages pass from your mailbox directly to the recipient's mailbox, removing the possibility for the software provider to compromise your communication security directly, by, e.g., MITM attack, or blocking your IP from accessing the server, or indirectly by collecting your metadata.
__________________________________________
HIGH STRENGTH END- TO-END ENCRYPTION
All messages are encrypted before they leave your phone and not decrypted until they reach the receiver's phone, encryptions are implemented using highly secure and efficient industry-standard algorithms(128 bits AES-GCM for symmetric encryption, and 2048 bits RSA for public key encryption ). Keys are stored locally in an encrypted database, with each page encrypted using a separate key. Additionally, connections to the mail servers are protected with SSL/TLS whenever possible.
__________________________________________
COMPLETE AND PROVABLE PRIVACY PROTECTION
Ciphertexts or plaintexts, all of your data belong to you! Hufu never connects to any server run by us(which can be easily proven by wiretapping your own connection or scrutinizing the code), thus there is no
possibility we collect or store your data without your permission, or violate your privacy in any other way. All private chat messages are deleted from your mailbox 24 hours after they are received/sent.
__________________________________________
MINIMALISTIC DESIGN AND INTUITIVE UI
Completely private chat has never been easier as Hufu makes encrypted messaging a seamless experience in a decentralized environment. The UI is designed under the principle of KISS(keep it simple, stupid), the number of UI elements are kept to a minimum but tuned to improve user's operational security awareness. Setting up is a breeze, all cryptographic processes happen under the hood and are unnoticeable. It should take less than minutes for a user completely new to Hufu to set up his Email account and start using Hufu.
__________________________________________
ROBUSTNESS
Any IMAP-supported mailbox can in theory be used with Hufu, making it nearly impossible to censor all Hufu encrypted messages, and the serverless and open source nature of Hufu allows it to function independent of the status of our business.
__________________________________________
MINIMUM PERMISSIONS
Device & app history
* retrieve running apps
Identity
* find accounts on the device
Photos/Media/Files
* access USB storage filesystem
* modify or delete the contents of your USB storage
* read the contents of your USB storage
__________________________________________
OTHER
* close other apps
* full network access
* view network connections
* control vibration
* use accounts on the device
__________________________________________
Precautions:
1. Avoid using on rooted devices, rooting could potentially allow malicious memory snapshotting/key recording programs to be installed without the user's consent, and breach Hufu's security.
2.If you are using any third-party software to manage your processes, please make sure that Hufu is allowed to run in the background, otherwise the retrieval of your messages may be delayed.
Do you think someone reads your messages and want to avoid?
With this app we can not stop someone from reading your messages, but at least he can not understand them.
Private and public keys
This app uses public-private key technology to encrypt and decrypt messages.
This technology is based on the factorization of prime numbers and ensures that an message encrypted with the public key can be decrypted only with the corresponding private key, and vice versa.
By definition, and to ensure the security of the process, the private key must remain in a safe place, while as you can share your public key with which to time.
Rest assured, it is not possible to regenerate the private key from the public key (see the section on key sizes).
Operations allowed
Basically it is possible to perform two operations on a message: encrypted with the public key of a person and that it shall be decrypted with your private key, which ensures that only he can read, and encrypt it with its own private key and the receiver decrypt with your public key, which guarantees the authenticity of the message.
Encrypt and decrypt messages
When you want to send a secret message to another user, you should encrypt it with the public key for that user, they must have been previously provided.
Later, the receiver can use your their own private key to decrypt it.
Sign and unsign messages (AKA validation)
When you want to send a secure message to another user, you must sign it with your private key.
The user must validate the message using your public key, which will be made available to it previously, and hen can know for sure that you are the issuer.
Note that rest of users, that doesn't know your public key, can't read the message.
A signed message cannot be altered by a third person!
Length of the keys
The size of the keys is essential to ensure system security.
A 1024-bit key can be enforced fairly easily, while a 2048-bit key, or even higher, is considered very, very safe.
Download
This app uses cryptographic software that can't be uploaded to the Play Store.
Due to that, for now you will download updates from here...
will try
CHANGELOG
1.0.1
First release
1.1.2
Applies a double encrypt algorithm to the messages to grant that 2 messages are always encrypted/signed different, even if the original messages are equals
Removed unused permissions
This version breaks backward compatibility with messages generated with a prior version of the app (of course, previously generated keys don't needs to be regenerated)
Project closed.
No one seems interested on it...
Millions flock to other messenger apps as fears grow over Big Tech.
SignalSignal uses Open Whisper System to automatically end-to-end encrypt all conversations.
Encryption keys are stored on users’ phones and computers, minimising the risk of them being spoofed. You will also be notified if any of your contacts’ encryption key changes.
Users can verify each other using either a passcode of numbers or by scanning a QR code, which means Signal holds almost no data about you.
The app does not store metadata, logs, or information on its users. It also does not store a record of your contacts, conversations, locations, profile name, avatar, group memberships or group titles.
Your chats do not get backed up by default, but you can choose to back them up to a secure cloud if you wish.
There is also a setting which allows you to receive “sealed” messages from non-contacts with whom you have not shared your profile, an option that hides your IP address, and a self-destructing messages option that disappear completely after a set time.
Telegram
Telegram uses its own end-to-end encryption service called MTProto. However, it is not entirely open source.
Its default cloud chat messaging system is not end-to-end encrypted, with chats stored on Telegram’s servers and backed up to a cloud. This means Telegram can gain access to your messages.
However, it also has a secret chat option, which is encrypted. Messages sent through secret chat can only be read on the device you sent them to.
BatChat
BatChat is a private & secure messaging app with end-to-end encryption which provides the highest level of data security.You can use it FREE to voice or video call families, friends, colleagues anytime and anywhere without worrying about data leakage.