With the rising number of savvy malintent hackers, the vast increase in identity theft victims, and the rampant expanding of government spying and surveillance programs, personal security, privacy and protection have become major issues challenging the most basic of human rights in the modern day. By combating this information free-for-all, surespot is able to return to the individual their due right to privacy. This privacy is what people have entrusted in surespot to keep secure and we intend to honor that trust without compromise.

surespot is the world’s most secure encrypted messaging app available, operating in over 100 countries with upwards of a half million users who have sent over 100 million secured messages.

Our proprietary technology provides iron clad means for people to protect the content of their mobile communications with one another by using the industry’s only zero-content system that is also backed and verifiable through a code base that features open source clients. This approach creates full transparency and invites peer reviewed scrutiny and inspection of security features so you can be confident in our claims.

It is our strong belief that this open source policy should be added to the list of evaluation criteria used by the Electronic Frontier Foundation (EFF) in their annual report, Who Has Your Back. Should surespot have been evaluated in this most recent report, we would have obtained a perfect score earning stars in every applicable category.

Here are those report categories and how they relate to surespot…

Requiring a warrant before handing over user content:


Despite not having any user content to provide, surespot still strictly adheres to this policy as highlighted above under Law Enforcement Guidelines.

Publishing Law Enforcement Guidelines:


Found on our Website

Notifying Users of Government Requests:


This category is not applicable to surespot as our solution design is too secure for it to be possible. This topic circles back to the Privacy vs. Functionality decision process. Due to the security architecture of surespot, we don’t know who our users are. We have no personal contact information that can be used to notify them. Personal contact information can be used to identify a person and/or possibly their location. For obvious reasons we don’t want this, and neither do you.

It confirms that surespot is setting the curve in the security space when the evaluation criteria standards being used by others, don’t even apply to our approach. These are the differentiators that place surespot in an entire different arena of security over other tools, and we have done this intentionally.

Ask yourself… If a company can personally contact you, do you really feel secure in your anonymity? From a technical standpoint, if they can notify you - they know who you are!

Disclosing Data Retention Policies:


surespot does not retain any deleted data on its servers. All deleted messages are instantly destroyed and forever gone the moment the user deletes them.

Disclosing Government Content Removal Requests:


This category is not applicable to surespot since we do not hold any content. It is impossible to verify how or whom is using the tool and therefore there is no content existing to be requested for removal from the system.

Pro-User Public Policy: Opposing Backdoors:


We strongly oppose all mandates, proposals or requests for technology companies to allow built-in weaknesses or back doors to their systems. Though at surespot, we want to do more than make a public policy statement. We want to give the world the tools needed to verify that we are doing what we say. This is why we provided the previously mentioned key fingerprint feature.

Any user can verify that there is no MITM backdoor intercepting data being sent from the client simply by comparing key fingerprints. A MITM attack would require the attacker to create new keys for intercepting and authenticating data in transit. Users can test this by cross checking the key fingerprint on their devices with each other. If the keys match, you have taken any question of a compromised server entirely out of the equation.

surespot is available on:

Get it on Google Play Available on the App Store