“US attorney general William Barr says Americans should accept security risks of encryption backdoors”
"The personal data of over 700 million Linkedin users, 93% of the platform’s total, was hacked on put on sale in 2021."
The new ecosystem powered by Solana
with world's first decentralised functionality
Send private messages
Break free from centralized parties
Rewards for Nodes opening
Invest into crypto projects
Validate your wallet and join the ecosystem
Communicate with other wallets in the platform
Smart public channels and launchpad
We are mentioned
- Architecture Design Beta Testing
- Implementation of network nodes
- Private Sale
- Public Sale
- Community Building + Competitions
- Token Smart Contract
- Secretum Network Set up
- Staking Protocol
- Mobile Application Development
- Mobile Integration with Nodes and Token
- First Alpha test release
- Partnership announcement
- Private Beta Testing and Airdrops
- Final Testing
- Deployment on App Stores
- Public Beta Release (Crypto Influencer Campaign)
Frequently asked questions
Secretum offers ultimate privacy by means of Blockchain and decentralization.
It means that there is no single managing body of the application. Your data is not routed through datacenters, but through nodes. There can be an arbitrary number of nodes in the network. It is nearly impossible to ban this application or filter it through a certain regulatory body.
Your messages get encrypted first and then route securely through a number of nodes before finally arriving at the final destination. Compared to our decentralization, the traditional centralized messaging systems send your message to data centers, analyze it for data mining, and then send it to the receiving body. We don’t do that.
Every conversation you initiate is started with a completely random key which never travels over the network, which means that there is no way any intruder can intercept your network traffic to know the key. Without the key, even if someone does get a hold of one of your messages, they will never be able to read it. All our communication protocols are built on an assumption that network medium is always compromised, which makes it impossible to intercept and spoof the communication.
Nodes are the endpoints which route data to your application, nodes may also store (encrypted) data of yours temporarily. Although it is encrypted with impenetrable measures, if you are still worried about your data being on someone else’s node (temporarily), you can also fire up your “own” node and be 100% sure that the data is within your vicinity.