Pryvate™ Encrypted Video Calls

Pryvate™ Encrypted Video Calls

Video Encryption

Video encryption takes video data and makes it impossible to view by anyone except the intended recipient – so long as the intended recipient has the correct key to decipher the data and view the video in its intended format.

There are two types of video encryption: personal and Digital Rights Management (DRM). Personal encryption refers to someone who wants to share a personal video with clients, family or friends and who does not want anyone unauthorised to see it. DRM is the same thing, although more complex. It can often include:

  • Different types of video streams for different price brackets
  • Region-specific videos
  • Media or device-specific videos
  • Software-specific videos
  • Adaptive streaming
  • Secure Video Encryption and Privacy (never known to us)
  • ZRTP Protocol negotiates a key between two VoIP end points

As with voice calls, a new key is generated every time a connection is made, which further protects the security and integrity of the data. This means that if an encryption key from a previous call was discovered – subsequent calls would not be compromised.

Video Encryption Interoperability Standards
Video codec specifications include:

  • VP8 (WebM), H263, H263-1998, MPEG-4, Theora and H264
  • Resolutions from QCIF (176 × 144) to SVGA (800 × 600

Pryvate™ Encrypted Instant Message (IM)
Off-The-Record (OTR) messaging is a cryptographic protocol designed to provide encryption for IM conversations. It ensures that messages do not have digital signatures and therefore cannot be monitored.

Secure IM Encryption from Pryvate™ s

  • Auto encrypted single/unique single session
  • 3G and 4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA and Wi-Fi
  • Peer to Peer – with no servers in the middle
  • No records of any messages or conversations are stored
  • AES symmetric-key, Diffie-Hellman and SHA-1 hash algorithms
  • User sessions are automatically deleted after a session is terminated

The application operates in standard unencrypted mode for normal conversations. If a secure conversation is required, the user activates secure mode, which initiates an authentication phase. This allows the user to verify the identity of the other party through a pre-arranged password, question and answer combination or fingerprint. Once authenticated, the application generates short-lived, session-based encryption keys – providing secure communications and perfect forward security. This ensures that the discovery of a past key does not compromise the security of future sessions. During secure IM conversations, digital signatures are removed and logging is disabled to ensure deniability.

Notification of Screenshots
An innovative security feature of Pryvate’s service detects when a screenshot is taken from within the Pryvate App. When this happens, the App automatically notifies the sender that the recipient is making a record of confidential information.

Translate »