Silent Phone uses Device-to-Device encryption technology, meaning only Silent Phone users exchange keys for each peer-to-peer call. The keys are not held on a server. Silent Phone uses the ZRTP protocol to encrypt the data packets of the phone call across the Internet. Silent Phone uses our secure Silent Network to facilitate the calling service and provide for complete security.
You can visit our ZRTP page for an extensive and in-depth overview of the technology behind Silent Phone.