Security & Encryption Practices
Effective Date: 1 January 2025
Last Updated: 27 November 2025
ProTalkie is designed from the ground up to protect your privacy and secure your conversations.
This page explains the security architecture, encryption methods, and protective measures we use to safeguard your data.
1. Security Philosophy
Our approach is simple:
-
Your conversations belong only to you — not us, not anyone else.
-
We don’t read your messages.
-
We don’t store your encryption keys.
-
We don’t sell your data.
-
We build security into every layer of the app.
2. End-to-End Encryption (E2EE)
All communication on ProTalkie — including:
-
Voice messages
-
Photos & videos
-
Files & documents
-
Text messages
-
Group messages
is protected with end-to-end encryption (E2EE).
** Note: Talkies are encrypted server-side only and are not end-to-end encryption (E2EE).
This means:
-
Messages are encrypted on your device
-
Only the intended recipient(s) can decrypt them
-
ProTalkie cannot read or listen to your messages
-
Even if our servers are compromised, message content remains protected
We do not hold or store encryption keys.
Keys never leave your device.
3. How Encryption Works (High Level)
To keep things simple:
-
When you send a message, it is encrypted locally on your phone.
-
Encrypted data is sent to our server only as ciphertext.
-
The recipient’s device uses its own private key to decrypt the message.
-
ProTalkie’s servers never see plaintext at any point.
4. Media Encryption
Voice messages, photos, videos, and files are:
-
Encrypted on the device
-
Uploaded as encrypted blobs to our cloud storage (AWS)
-
Decrypted only on the recipient’s devices
Even if a file is intercepted or accessed on the server, it is unreadable.
5. What Is Not Encrypted End-to-End? (Metadata Transparency)
Like all E2EE services, talkies and certain metadata is not encrypted end-to-end:
-
Talkies
-
Message timestamps
-
File size
-
Message type (voice, photo, etc.)
-
Sender & receiver identifiers
-
Device type
-
Crash logs
-
Contact phone numbers (for sync)
This information is stored securely using standard encryption and access controls, but it is not end-to-end encrypted.
6. Device Security & Key Handling
Encryption keys are stored only on your device.
We do not:
-
store your private keys
-
have access to your private keys
-
transmit keys to our servers
-
back up your keys
If you lose your device, message keys cannot be recovered by us.
7. Cloud Infrastructure Security
ProTalkie uses trusted, industry-leading infrastructure:
Firebase (US region)
-
Authentication
-
Analytics
-
Crash reporting
-
Secure database services
AWS (Asia-South)
-
Encrypted storage for media files
-
High availability, redundancy, and physical security
All services use:
-
TLS/HTTPS for data in transit
-
Security groups & IAM policies
-
Strong access controls
-
Rotating credentials
-
Audit logging & continuous monitoring
8. App-Level Security Controls
ProTalkie includes several protections on the user side:
8.1 Block & Report Tools
Users can instantly block others or report abusive behavior.
8.2 No Ads, No Trackers
We do not use:
-
Advertising SDKs
-
Behavioral tracking
-
Third-party marketing tools
8.3 Contact Sync Privacy
We only upload contacts for friend discovery.
8.4 Secure Push Notifications
Only metadata is sent via APNS/FCM — never message content.
9. Internal Security Practices
We enforce strict internal access controls:
-
Role-based access to systems
-
No employee access to user message content
-
Limited access to metadata on an as-needed basis
-
Mandatory device security for staff
-
Security training & confidentiality obligations
-
Regular audits and monitoring
10. Protecting Against Abuse, Spam & Unauthorized Use
We use:
-
Rate limiting
-
Device-level abuse detection
-
Account integrity checks
-
Fraud prevention signals
-
Behavioral monitoring of suspicious activity
(never involving message content)
11. Data Retention & Deletion Security
-
Messages & media remain encrypted until you delete them
-
Deleting a message removes it from all recipients’ devices (if implemented)
-
Deleting your account triggers full data removal within 30 days
-
No undeleted backups exist for message content
We cannot retrieve deleted encrypted data.
12. Vulnerability Reporting
We welcome responsible disclosure of security issues.
Email our security address: admin@pplsttech.com
Subject: Security Report – Urgent
Please include technical details.
We will confirm receipt and respond promptly.
13. No Backdoors. No Special Access.
ProTalkie does not:
-
Build backdoors for any government
-
Provide private access to encrypted content
-
Allow mass surveillance
-
Weaken encryption for any jurisdiction
Privacy by design.
Security at every step.
14. Ongoing Security Improvements
We continually enhance ProTalkie’s security:
-
Routine audits
-
Infrastructure monitoring
-
Upgrading cryptographic techniques
-
Strengthening storage and network protections
-
Reviewing code for vulnerabilities
15. Contact Us
For security or privacy-related questions:
PPLST Tech Private Limited
Email: admin@pplsttech.com


