End-to-End Encryption (E2EE)
When we say end-to-end encrypted, we mean it. Your messages and data are encrypted on your device before they ever leave it, and only the intended recipient can decrypt them. Not us. Not your ISP. No one in between.
What this means for you: Even if someone intercepts your data in transit, or if a server is compromised, they get unreadable garbage. The keys to decrypt your data exist only on your devices.
AES-256-GCM
Military-grade symmetric encryption used by governments worldwide. Encrypts the actual content of your messages and files.
X25519 Key Exchange
Elliptic curve Diffie-Hellman for securely establishing shared secrets between parties without ever transmitting the key.
Double Ratchet Protocol
Used in XecureCom, the Double Ratchet (the same approach used by Signal) provides forward secrecy and break-in recovery. Every message uses a new encryption key derived from the previous one.
Key A
Key B
Key C
New keys
Each message ratchets to a new key. Compromising one key doesn't expose past or future messages.
Forward Secrecy: If an attacker somehow obtains a key, they can't decrypt messages sent before or after—only that single message. Keys are ephemeral and constantly rotating.
Peer-to-Peer Architecture
Many Greenlyz apps use direct peer-to-peer connections rather than routing everything through central servers. Your data travels directly between you and the person you're communicating with.
No Central Storage
Messages aren't stored on our servers waiting to be hacked. They exist on your device and the recipient's device—that's it.
Ephemeral by Design
When a sender goes offline or blocks a recipient, the keys needed to read messages are gone. True deletion, not just hidden.
WebSocket Direct Connect
Real-time encrypted channels established directly between peers for instant, low-latency communication.
No Metadata Harvesting
We don't log who talks to whom, when, or how often. The less we know, the less can be subpoenaed or stolen.
Self-Hosted Options
Apps like OneStop are designed to run on your own hardware. Your files, your server, your rules. No third-party cloud provider has access to your data because it never leaves your network unless you want it to.
Why it matters: Cloud providers can be compelled to hand over data, can suffer breaches, or can simply shut down. Self-hosting puts you in complete control of your data's lifecycle.
Future-Proof Security
We're actively researching and implementing quantum-resistant cryptography. As quantum computers threaten current encryption standards, we're preparing with algorithms designed to withstand quantum attacks.
CRYSTALS-Kyber
Lattice-based key encapsulation mechanism selected by NIST for post-quantum standardization. Already in testing for future releases.
Hybrid Approach
Combining classical and post-quantum algorithms ensures security against both current and future threats during the transition period.