How Hushed Added End-to-End Encryption to Their Messaging and Phone App | Virgil Security (2024)

We at Virgil Security are pretty hardcore privacy geeks. So when we meet teams like theHushedcrew who are just as focused on protecting the privacy of people around the world, we get pretty excited to work together.

Hushed provides private, temporary numbers and anonymous user-to-user messaging. They have been around for 5 years and have over 6 million downloads in 70+ countries.

The team just released Hushed 4.0, a brand new version that uses Virgil Security’s Perfect Forward Secrecy to add end-to-end encrypted messaging and all messenger related content.

Learn how they implemented Virgil’s end-to-end encryption SDK below.

From the Hushed team:

This technical post walks you through our key decisions and learnings in our end-to-end encryption implementation journey. We feel that if we had a similar post to read at the time, it would have saved us time and a couple of gotchas, so in an effort to make your journey smoother, we’re sharing our learnings.

At Hushed, we believe in the right of a person to be private and, to a large degree, anonymous as well. This core belief is deeply wired into all essential parts of our app; we don’t require the user to sign up with a valid email address or phone number to verify their identity. We do not keep or share any information other than what is necessary for the app to function, i.e. you can re-download your SMS messages and call history but when you delete it, we delete the information from our servers as well.

In that spirit we wanted to offer a messaging feature that was anonymous to the degree a user chooses to be and offers strong guarantees about the privacy of their messages as well.

Among the requirements for our messenger were the following:

  1. End-to-end encryption so we can’t be compelled to give access to a user’s message content
  2. Compromising a key shouldn’t compromise the whole conversation (forward secrecy)
  3. Private keys and/or passwords would never be sent to our server
  4. Secure and reliable platform for storing the public encryption keys
  5. The least information possible about the user and their communications would be stored
  6. Encrypted communication should only be stored on our servers for as long as it is needed for message delivery
  7. Support multiple profiles on one device concurrently

We evaluated a number of different open-source and proprietary projects in our search for a platform and technology that enables us to achieve all these requirements. A preference was given to open-source projects that had been rigorously tested.

One of the obvious choices is libSignal by Open Whisper Systems which has strong end-to-end encryption and forward secrecy. However, their open-source license was incompatible with our business requirements and we found their closed-source licensing and review process to be cumbersome, slow and unsupportive of moving our goals forward in a reasonable time-frame.

Virgil Security offered us the right mix of privacy, security, and expertise for our messaging product. Their licenses and pricing worked for our use-case, and they gave us plenty of developer support to ensure a high-quality product.

Message Delivery

Hushed uses secure Websockets (WSS) with JSON web-token-based authentication (JWT) and push notifications to deliver messages to the mobile clients. We use WSS when either one or both parties are actively engaged in a conversation and push notifications to notify a user of new messages when they are offline.

One of the benefits of using WSS is that it allows Hushed to support “is typing” and “has read” style interaction patterns. These messages are relayed as transient messages via WSS only to online devices.

When a user sends messages to another user we have to set up or reestablish an encrypted session between the devices of both users (note that this is not the same as verifying the other user’s identity). The diagrams below illustrate that workflow from both the sending and the receiving side.

The “Get keys for recipient from the server” is actually a two step process. First, it grabs the Virgil registration ID for the recipient from our server. The client then requests the registration information (the public keys required to establish a secure connection) from Virgil’s servers using the retrieved ID.

Since private keys are not shared, we needed to handle tying a specific Virgil registration to a preferred device (and then the preferred device to the account) within our database. This was a trade-off of allowing a user to only have a single device capable of decrypting a message (security), and dropping multi-device support (for now at least).

A key benefit to inserting ourselves in the registration process means that we also get the chance to broadcast to users when a participant in one of their conversations has changed registration information (changed devices, re-installed, etc.) and a simple message is shown. For the security conscious this means that they can check that their session is still secure via a readable key.

Group Messaging

End-to-end encrypted group messaging is an interesting topic with a couple of approaches that can be used.

  1. Client-side fan-out: The client is responsible for sending a message to each participant using their own established connection. This provides more security but a lot more failure points for message sending as well and difficulties providing a clean User Experience when a message did not successfully send to all of the participants.
  2. Server-side fan-out: The client sends a single message to the server and the server is responsible for sending out the message where each member encrypts messages using a key (sender key) shared through a one-to-one conversation.

We decided to use server-side fan-out as this simplified the message sending process from a technical perspective. Some consideration needed to be put into how you maintain forward secrecy which just involves rotating the sender keys periodically and on certain events (i.e. when a member joins or leaves a group) so that messages not intended for a recipient can’t be decrypted.

As you can see in our group message sending flow, it very closely mirrors the one-to-one messaging flow and leverages it to maintain our goals of forward secrecy and end-to-end encryption.

Work in Progress…

The above gives you insight into some of the core motivations and decision behind our implementation of end-to-end encrypted messaging.

While we are happy with the current platform there are still a couple of areas that at the time of writing of this post were still open areas for improvement in later versions:

  1. True multi-device support
  2. Backup of user-content

But hey, we keep our roadmap in a bottomless jar, so there’s always room for delivering new capabilities for our users as well.

Learn more at on the Hushed website and download the app for Applehereand Androidhere.

As always, Virgil Security is available to answer any questions you might have about end-to-end encryption. Sign up for a freeVirgil accountandjoin our Slack communityto start a conversation.

How Hushed Added End-to-End Encryption to Their Messaging and Phone App | Virgil Security (2024)

FAQs

Is the Hushed app encrypted? ›

End-to-end encryption is enabled on all chats by default. This differs from other apps which only encrypt messages if the user specifically turns it on. Screenshot detection is a safety feature that allows users to receive notifications when someone screenshots their messages.

How does end-to-end encryption messaging work? ›

End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another. In E2EE, the data is encrypted on the sender's system or device, and only the intended recipient can decrypt it.

Why am I getting end-to-end encrypted messages? ›

End-to-end encryption helps protect your privacy by ensuring no one sees your messages except you. Think of it as an extra layer of security that keeps your messages and calls with family and friends protected from the moment they leave your device to the moment they reach the receiver's devices.

What messaging app uses end-to-end encryption? ›

No matter who owns it, WhatsApp remains one of the easiest ways for anyone to use end-to-end encrypted messaging. If you're not comfortable with Facebook's presence, there are plenty of other options on this page.

Can Hushed be traced by police? ›

When making a call or texting through Hushed, the recipient sees ONLY your Hushed phone number as the Caller ID - just like any traditional number. Rest assured that your real phone number from your SIM card is always completely hidden and cannot be traced back to you.

Can a Hushed number be traced back to me? ›

Hushed numbers are untraceable and anonymous, which is very important to our customers who wish to call and text privately.

How do you know if someone is using end-to-end encryption? ›

Check if a conversation is end-to-end encrypted

End-to-end encrypted conversations have: A banner that says “ Chatting with [contact name or phone number].” A lock next to message timestamps. A lock on the send button when you compose a message.

What are the algorithms for end-to-end encryption? ›

Common encryption algorithms used in E2EE include the Advanced Encryption Standard (AES), RSA, and the Signal Protocol. These algorithms are considered secure and have been widely adopted for their robustness against attacks. Encryption key management is also crucial in ensuring the security of E2EE.

Can end-to-end encryption be cracked? ›

The end-to-end encryption paradigm does not directly address risks at the communications endpoints themselves. Each user's computer can still be hacked to steal their cryptographic key (to create a MITM attack) or simply read the recipients' decrypted messages both in real time and from log files.

Is it good to turn on end-to-end encryption? ›

End-to-end encryption helps protect your conversations by ensuring no one sees your messages except you and who you're chatting with. You can turn on secure storage to save your end-to-end encrypted chat history and access your personal messages from other devices.

Why would someone encrypt text messages? ›

Encrypted text messaging is a method of secure communication that converts your messages into code. This means that only the recipient with the correct decryption key can read it. It's a way to keep your conversations private from prying eyes, whether they're hackers, advertisers, or even government agencies.

What are the problems with end-to-end encryption? ›

If either endpoint is compromised through malware, hacking, or physical access, it can undermine the effectiveness of end-to-end encryption. Attackers may gain unauthorized access to decrypted data or intercept information before it gets encrypted.

What text app is untraceable? ›

Signal is the clear pick if you're looking for the best encrypted messaging app; Threema is useful if you want anonymity or a more apparent funding source; and WhatsApp is secure enough for daily use for most people and justifiably popular.

What is the most private way to chat? ›

Here's our list of the best encrypted messaging applications:
  • Signal.
  • Threema.
  • iMessage.
  • Facebook Messenger.
  • Viber.
  • Line.
  • Wickr Me.
  • Google Messages.
Feb 23, 2023

What is the best secret conversation app? ›

Telegram, WhatsApp, Facebook Messenger, Signal, and Viber are all secret texting apps for Android. They have hidden chat features. Telegram is the best secret texting app for Android.

Is Hushed completely anonymous? ›

Select a U.S. or Canadian number to get three days of unlimited calling and texting, absolutely FREE! ✔ DOWNLOAD HUSHED NOW! Stay anonymous, keep convos completely private, and delete numbers once you're done with them. Leave no trace behind.

Is Hushed a safe app? ›

With over three million downloads, 20 million calls, and 200 million messages sent, Hushed has proven to be an app people trust without having to go through the pain of swapping SIM cards, or buying a physical burner phone.

Is Hushed HIPAA compliant? ›

Hushmail is also a HIPAA-compliant service provider that offers a Business Associate Agreement (BAA). And the information is encrypted.

Is the HushUP app safe? ›

HushUP will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal ...

Top Articles
Cryptocurrency Prices, Charts & Crypto Market Cap - CoinCheckup
The Psychological Toll of High-Stakes Testing
Netronline Taxes
Www.1Tamilmv.cafe
Cumberland Maryland Craigslist
Melfme
Optimal Perks Rs3
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Ecers-3 Cheat Sheet Free
My.doculivery.com/Crowncork
zopiclon | Apotheek.nl
No Strings Attached 123Movies
Ivegore Machete Mutolation
Insidekp.kp.org Hrconnect
Premier Reward Token Rs3
Fool’s Paradise movie review (2023) | Roger Ebert
Are They Not Beautiful Wowhead
Wisconsin Women's Volleyball Team Leaked Pictures
Velocity. The Revolutionary Way to Measure in Scrum
The Exorcist: Believer (2023) Showtimes
E22 Ultipro Desktop Version
Why Should We Hire You? - Professional Answers for 2024
Quest: Broken Home | Sal's Realm of RuneScape
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Pasco Telestaff
Terry Bradshaw | Biography, Stats, & Facts
Okc Body Rub
Wkow Weather Radar
Chamberlain College of Nursing | Tuition & Acceptance Rates 2024
Boise Craigslist Cars And Trucks - By Owner
Finding Safety Data Sheets
Booknet.com Contract Marriage 2
Random Bibleizer
Craigslist Auburn Al
Craigslist Boerne Tx
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Blackstone Launchpad Ucf
Los Garroberros Menu
Winco Money Order Hours
Mid America Clinical Labs Appointments
Noaa Duluth Mn
Cl Bellingham
Trivago Sf
Joey Gentile Lpsg
Shell Gas Stations Prices
Ups Authorized Shipping Provider Price Photos
Missed Connections Dayton Ohio
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Jesus Calling Oct 6
ats: MODIFIED PETERBILT 389 [1.31.X] v update auf 1.48 Trucks Mod für American Truck Simulator
Cataz.net Android Movies Apk
Supervisor-Managing Your Teams Risk – 3455 questions with correct answers
Latest Posts
Article information

Author: Dan Stracke

Last Updated:

Views: 5821

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.