About Phiz's End-to-End Encryption Technology

LAST UPDATE: 08/10/2024

Phiz

Phiz places a high value on user privacy and security, which is why we have integrated end-to-end encryption technology into our app. With end-to-end encryption enabled, your messages, photos,videos, voice messages, documents, status updates, and calls are protected from unauthorized access.

Sending Private Messages

When you use Phiz Chat to communicate, Phiz’s end-to-end encryption technology is automatically activated. This ensures that only you and the recipient can view or hear the content of the messages sent. No intermediary, not even Phiz, can access the messages. End-to-end encryption functions like a lock on your messages, with only you and the recipient having the key to unlock and read them. The process is entirely automatic, requiring no special settings to secure your communications.

Sending Business Messages

Every Phiz message is protected by the Signal encryption protocol, which encrypts the message before it leaves your device. When you send a message to a Phiz business account, it is securely delivered to the recipient chosen by the business.

For businesses using the Phiz Business app or managing and storing customer messages, Phiz considers conversations as end-to-end encrypted. Once the message is received, it is handled according to the business's own privacy protection measures. The business may assign specific employees or even third-party providers to manage and respond to messages.

Some businesses may choose to securely store customer messages and replies through Phiz. Phiz does not automatically determine advertisements you will see based on messages sent to businesses. However, businesses may use conversation data for their own marketing purposes, including displaying ads on Phiz. You can always contact the business directly to inquire about their privacy practices.

Payments

Phiz’s payment functionality, available in certain regions, facilitates transactions between financial institutions. Card numbers and bank account information are securely encrypted. However, since financial institutions need to process transactions, such payments do not use end-to-end encryption.

    What is the "Security Code" in the Contact Information Screen?

End-to-end encrypted conversations between you and another person have their own security code. This code is used to verify that calls and messages sent in the conversation are end-to-end encrypted.

Verification is optional and simply confirms that the messages and calls are indeed protected. Each conversation has a unique security code, displayed as a QR code and a 60-digit number, which contacts can compare to ensure encryption. The code is a visible version of the shared key between you and your contact, ensuring the conversation’s security without revealing the actual key.

To Verify an End-to-End Encrypted Conversation:

    1. Open the conversation.
    2. Tap the contact's name to open their profile.
    3. Tap "Encryption" to see the QR code and 60-digit number.

If your contact is nearby, one of you can scan the other person’s QR code or check if the 60-digit code matches. If the QR code is confirmed, a green checkmark will appear. This indicates that you can be assured no one has intercepted your messages or calls.

If you and your contact are not physically close, you may send the 60-digit code to your contact using another platform. Instruct your contact to take note of the code upon receipt and compare it with the 60-digit code displayed on the contact information screen. If you are using Android or iPhone, you can use the "Share" button on the “Security Code” screen to send the 60-digit code via SMS, email, or other means.

If the security code does not match, it may indicate that you have scanned the QR code of a different contact or phone number. If your contact has recently reinstalled the Phiz app, changed phones, or added or removed paired devices, we recommendsending them a new message and then scanning the QR code again to update the security code.

Please note that if you or your contact are using Phiz on multiple devices, it will be necessary to verify the security code on all devices for both parties.

    Why Does Phiz Offer End-to-End Encryption? What is the Importance of This Technology in Protecting User Security?

Security is of utmost importance to the services offered by Phiz. We have seen numerous real-life cases where criminal hackers have obtained large amounts of private data and misused the technology to harm people with the stolen information.

Phiz cannot view the content of messages or listen to end-to-end encrypted calls. This is because the encryption and decryption of messages sent and received via Phiz are entirely processed on your device. Before leaving your device, the message is encrypted with a lock, and only the recipient has the corresponding key. Moreover, the key changes with every message sent. While all of this happens in the background, you can view the security code on your device to confirm that your conversation is protected.

Naturally, some may ask how end-to-end encryption technology impacts the work of authorities. Phiz appreciates the efforts of authorities in ensuring global safety, and we review, verify, and respond to official requests in accordance with relevant laws and policies, prioritizing cases based on urgency. As part of our educational efforts, we provide information to authorities on the limited data we collect and how they can submit requests to Phiz.

Copyright 2023 - 2024 Phiz Software, Phiz Corporation. All rights reserved