CLICK HERE TO SEE IT ON GOOGLE PLAY

WE DON'T UPLOAD YOUR CONTACT LIST
During other messaging app's installation, a pop-up may appear requesting access to the phone book. This may be useful in some cases, as it allows the app to import all contacts straight away and the user to launch a chat easily. However, it involves uploading the phone numbers of all the contacts in the phone's memory to the servers of the app developer. In other words, the phone numbers in the smartphone are copied to another location. The question is to what extent this constitutes a risk for your organization. It may be the case that the phone book lists persons in a sensitive position or with a secret number. The third party will also have come into the possession of the phone numbers of colleagues or clients, who won't be aware that the third party possesses their data. Consider the legal ramifications for your organization, e.g. with regard to its privacy policy and any contracts or non-disclosure agreements signed with business partners. Such agreements may contain clauses preventing the sharing of client data with third parties.

WE DON'T OBTAIN DATA FROM YOUR USAGE
Messages sent by other messaging apps are usually accompanied by behavioral and user data, which is transmitted in the background. By analyzing this data, other parties may be able to infer who was in contact with whom, at what time and how often. This data may also include user status and profile pictures.

OTHERS CAN'T VIEW YOUR MESSAGES
On other apps if network traffic is not sufficiently encrypted, external parties will be able to intercept it and view the contents of messages. Both foreign intelligence agencies and criminal organizations are keen to intercept network traffic, and have the means to do so.

NO CONFIDENTIAL INFORMATION IS OUTSIDE YOUR CONTROL
On other apps data may be transmitted to an external server even before other messaging apps are fully installed. Whether and for how long messages are stored on the server depends on the individual messaging app.

OTHER APPS STORE YOUR DATA ON THEIR SYSTEMS
You organization neither manages the server nor has an overview ofthe data that have been transmitted to it. In addition, such data may be stored on servers in foreign countries, in which case different laws and regulations apply. This potentially allows third parties to access and share the data without permission. Foreign intelligence agencies may request such data if they are stored on servers which fall under their jurisdiction. By consequence, your organization is reliant on the security of a third party with which you have not entered into an agreement.

EVOLVE TO STAND ALONE ENCRYPTED SMS TEXT
NUNYA is an encrypted text SMS message system that enables the user to secure instant messages using a wide variety of cyphering methods both PUBLIC and PRIVATE. NUNYA allows the user to send and receive secure messages with selected partners. The keys and passwords are held by the users and no one else. All messages sent and received by Nunya are stored in a cyphered fashion and cannot be viewed without your keys.

AUTO-SECURE LINK PUBLIC KEY SYSTEM
You can automatically link with others with a public key system. Simply hit the lightning bolt ICON and the Android systems will link up in a secure mode with a key size larger than the NSA is requiring for future Quantum computing. No exchange of private keys or passwords. Just click and secure link. The NUNYA 4096 system uses a one time transmission key. Once you're done. Close the NUNYA app and the key is gone. No access to any transmitted data or any saved data in your inbox.

THIS IS WHAT YOU SEE ==>

THIS IS WHAT IS SENT ==>

 

NUNYA PHONE BOOK - REQUIRED FOR NUNYA

Download FREE Nunya Phone book on Google Play

NUNYA is teamed with its own phone book which allows you to enter the name, number and type of cypher used for each secure contact.

We have added the new 4096 bit RSA key feature. Make as many keys as you like. One click on the KEY icon and it's done.

The PHONE BOOK allows NUNYA to automatically code and decode messages with others. No mess. No fuss. Just set up your contacts and NUNYA will do the rest. The phone book is secured with your personal password so the contact data can only be accessed by you. NUNYA messager does not operate without the phone book.

SECURE PHONE DIALER:
The Nunya Phonebook is equipped with an automatic dialer feature. Select a phone entry then hit the red phone ICON and Phonebook will dial the contact.

PHONE CALL LOG
Calls made to contacts in the Phonebook are deleted from the CALL LOG and any received calls from contacts in your Phonebook are also deleted. The Phonebook will not delete missed calls or calls made from your regular phone dial program. This feature allows you to maintain a list of contacts encrypted on your phone that is secure and the phone log will not show those contacts or their numbers.

NUNYA can communicate using a wide variety of secret code keys. Each of these code key systems vary in security levels, including a 4096 bit RSA public key system built right into the PHONEBOOK and NUNYA system.

Password – First level security:
Cypher and de-cypher messages using a personal password of no less than 7 characters. We improved the password system to include a one time transmission key. Each message is encrypted with a new transmission key so even the simple password feature is super powerful.

User Key File – Second level security:
Any file to be used as a key to cypher and de-cypher. The user selected key file can be any document, picture, music, text or work file.

Crypto Key File - Third level security:
This is a key file created by the either the Windows PC Cypher key maker or the Android Cypher key maker that utilizes the Pseudo-Random Number Generator (PRNG) to create a very large set of random numbers. The Crypto Key maker utilizes several system features such as time, key strokes, and many other variables to randomly seed and create large keys using a mathematical algorithm. The crypto key file is considered to be superior to the User key in that it is much more random.

IMAGE Key File – Highest level security:
The image key is created by using the Android Cypher applications and your camera phone to sample light in three basic colors – red, green and blue. This system is known as a True Random Number Generator (TRNG) because the key is generated by the light recorded by your camera. The image key is the most secure because it is created using quantum physics by recording the values of photons electronically. The image key is similar in performance to keys generated by sensors inside Atomic clocks that detect radioactive decay.

 

BUY IT NOW and download it from Google Play

* REQUIRES FREE Nunya Phone book download from Google Play

ALL our products on hard copy CD - LINUX, Android and Windows in one package
ENTERPISE COMBO PACK ALL - Cypher with light sensor, PDA, Choctaw encrypted Email, NUNYA SMS Text


TECHNICAL SPECIFICATIONS

NUNYA can use a 4096 bit RSA asymmetrical stream cypher public key system which auto-links each session.

NUNYA can use a symmetrical stream cypher private key system in a ONE TIME PAD mode. This means that you exchange keys with the individuals you wish to communicate to and use the entire key only ONE TIME.

SYSTEM REQUIREMENTS:
Android 4.1.2 or later
External SD card 1 Gigabyte or more

TRADEMARKS:

Android is a registered trademark of Google Inc.
Windows is a registered trademark of Microsoft Inc.

NUNYA Manual (PDF Format)

How to video - Nunya Encrypted Text Message app

Contact Us:

Business owners - contact us for customized encrypted email and SMS text tailored to suit you. Offer your customers a unique and secure link to your business with our commerical license.