image2.jpg
Screenshot 2015-07-27 18.36.01.png
image2.jpg

Technology


How does it work?
 

Every Ccc: message and associated attachments are encrypted end-to-end and deleted immediately once read. Even if we wanted to read, share or restore the message... we can't. 

SCROLL DOWN

Technology


How does it work?
 

Every Ccc: message and associated attachments are encrypted end-to-end and deleted immediately once read. Even if we wanted to read, share or restore the message... we can't. 

 
Screenshot 2015-04-23 15.12.23.png
 
Screenshot 2015-07-27 18.36.01.png

Our Promise To You


Our Promise to You

Our Promise To You


Our Promise to You

Premium protection

Each Ccc: message is encrypted end-to-end and self-destructs without a trace. No data is ever kept or logged on our servers and no content is ever saved on a user's device or cached. Messages are decrypted on the sender's device once sent, and on the receiver's device once read. 

Minimal data retention

Confidential CC retains the minimal amount of information about our customers' activities as possible. A login technology called oAUTH2 is utilized when possible, which provides a unique and secure token i.d. to guarantee your login method secure and private. In turn, your user name and password are never stored and always secure. 

Hardware

The security of our servers, networks, and equipment is equally as important as data security. Confidential CC uses best-in-class security technologies to protect the hardware that transmits your messages. Since we believe these are only your business, we would never share this information with anyone.