Logo Silentel Kontakt
EN
News

Secure Conference

Secure conference allows secure real-time voice communication between two and more users with device-to-device encryption.

2018-02-21T17:01:00+01:00

To make a Secure Conference with Silentel, the user simply selects multiple users from the Silentel contact list. Selected users will receive notification similar to an incoming call. Users will be connected to a conference call after accepting incoming notification.

Other users can be added during the conference itself.

The user can leave the conference at any time and then rejoin it again.

The conference allows you to view the list of participants with the following details:

  • Who received a conference call (or who was invited but did not accept a conference call)
  • Who is currently talking

How is Secure Conference encrypted?

Most conference systems which declare encrypted communication did not provide true end-to-end encryption.

How other systems works? Encrypted communication is established between user and conference server. User's voice stream is encrypted and sent to server. Server decrypts the voice streams received from users and mix it together. Mixed voice stream is encrypted and forwarded to users. And this is wrong, because the conference server is the weak point where the encrypted communication can be intercepted or compromised in several ways.

How Silentel Secure Conference works? Each Secure Conference communication is protected by a unique encryption key which is distributed solely between participants. Voice stream is encrypted before sending and is decrypted only after delivery to receivers (directly in users' devices). Voice stream is mixed directly on users' devices (not by the server or any other part of the system). Data are never decrypted during transfer. Even the Silentel Server never knows the encryption keys and is not able to decrypt the content of Secure Conference communication.

You may also like

2022-09-12T11:27:45+02:00
Security

Ako bezpečné sú proprietárne „bezpečné telefóny“?

Pozrieme sa na súčasnú realitu bezpečných telefónov a posúdime, či majú v tejto dobe miesto.

Precitať viac
2022-09-05T13:33:41+02:00
Security

Chatovacie aplikácie a informačné pasce. Viete, čo používate?

Potenciálne riziká, ktoré podstupujete pri používaní bezplatnej chatovacej aplikácie.

Precitať viac
2022-08-03T09:59:52+02:00
News

Zadné vrátka do vášho zariadenia: ako vlády kradnú dáta

História kryptografie, šifier a zadných vrátok dnes ovplyvňuje zabezpečenú komunikáciu. Čítajte viac.

Precitať viac