Data Storage
Peace of mind assured!
Stay informed about the reality.
It’s smart, you know what you need.
Zukka supports 3 methods of data storage, covering chat messages, contacts, and the SecureBox.
Basic
The data is stored on your device. This is the most common method, and almost all applications use it.
Question:
What happens if you lose your phone or it’s forcibly taken from you? It’s almost certain they will have access to your data. If you don’t believe it, ask an expert. Essentially, this method benefits the companies, which is why it’s so widespread.
Smart *
The encrypted data consists of the data + keys. Zukka uses a different encryption key for each pair or group of chat participants.
So:
Don’t worry, if someone gains access to your data (for example, if you lose your mobile phone), they won’t be able to do anything useful with it. This is because they would need the keys to access the data from the server in order to retrieve any information. The same applies in the other direction: if someone has your data from the server but doesn’t have the keys from your device, they still won’t be able to do anything useful with it.
It is a simple, smart, reliable and recommended method.
Because when someone has the data without the keys, they can perform a brute force attack, especially with the future development of quantum computers. Taking data from the server is much harder — unless it’s a terrorist organization or criminal activity — which is strictly prohibited by our policy (TOS).
If hackers access the data, it is essentially useless (garbage) without the encryption keys. If it’s a terrorist organization or criminal activity — which is strictly prohibited by our policy (TOS) — then after the completion of legal proceedings, if they also have access to your mobile phone, YES, they could potentially view your information.
Master *
None of your data (data + keys) — except for what you’re currently processing — is stored on your device. Additionally, none of your data (data + keys) is stored on our servers. All of your data (data + keys) is stored on a device you have designated as your master device, which is kept in a secure location. You can also combine this with a proxy or Tor connection if you wish. This master device can be a mobile phone, PC, notebook, etc.
How it works :
Custom solution:
If you are a company, bank, or government security agency and require a privately owned system with dedicated servers and a white-label app, we can provide a tailored offer after a detailed review of your requirements!