With the rising number of savvy malintent hackers, the vast increase in identity theft
victims, and the rampant expanding of government spying and surveillance programs, personal
security, privacy and protection have become major issues challenging the most basic of
human rights in the modern day. By combating this information free-for-all, surespot is able
to return to the individual their due right to privacy. This privacy is what people have
entrusted in surespot to keep secure and we intend to honor that trust without
surespot is the world’s most secure encrypted messaging app available, operating in over 100
countries with upwards of a half million users who have sent over 100 million secured
Our proprietary technology provides iron clad means for people to protect the content of
their mobile communications with one another by using the industry’s only zero-content
system that is also backed and verifiable through a code base that features open source clients.
This approach creates full transparency and invites peer reviewed scrutiny and inspection of
security features so you can be confident in our claims.
It is our strong belief that this open source policy should be added to the list of
evaluation criteria used by the Electronic Frontier Foundation (EFF) in their annual report,
Who Has Your
Back. Should surespot have been evaluated in this most recent report, we would have
obtained a perfect score earning stars in every applicable category.
Here are those report categories and how they relate to surespot…
Requiring a warrant before handing over user content:
Despite not having any user content to provide, surespot still strictly adheres to this policy
as highlighted above under Law Enforcement Guidelines.
Publishing Law Enforcement Guidelines:
Found on our
Notifying Users of Government Requests:
This category is not applicable to surespot as our solution design is too secure for it to be
possible. This topic circles back to the Privacy vs. Functionality decision process. Due to the
security architecture of surespot, we don’t know who our users are. We have no personal contact
information that can be used to notify them. Personal contact information can be used to
identify a person and/or possibly their location. For obvious reasons we don’t want this, and
neither do you.
It confirms that surespot is setting the curve in the security space when the evaluation
criteria standards being used by others, don’t even apply to our approach. These are the
differentiators that place surespot in an entire different arena of security over other tools,
and we have done this intentionally.
Ask yourself… If a company can personally contact you, do you really feel secure in your
anonymity? From a technical standpoint, if they can notify you - they know who you are!
Disclosing Data Retention Policies:
surespot does not retain any deleted data on its servers. All deleted messages are instantly
destroyed and forever gone the moment the user deletes them.
Disclosing Government Content Removal Requests:
This category is not applicable to surespot since we do not hold any content. It is impossible
to verify how or whom is using the tool and therefore there is no content existing to be
requested for removal from the system.
Pro-User Public Policy: Opposing Backdoors:
We strongly oppose all mandates, proposals or requests for technology companies to allow
built-in weaknesses or back doors to their systems. Though at surespot, we want to do more than
make a public policy statement. We want to give the world the tools needed to verify that we are
doing what we say. This is why we provided the previously mentioned key fingerprint feature.
Any user can verify that there is no MITM backdoor intercepting data being sent from the client
simply by comparing key fingerprints. A MITM attack would require the attacker to create new
keys for intercepting and authenticating data in transit. Users can test this by cross checking
the key fingerprint on their devices with each other. If the keys match, you have taken any
question of a compromised server entirely out of the equation.