* REQUIRES FREE Nunya Phone book download from Google Play
WE DON'T UPLOAD YOUR CONTACT LIST
WE DON'T OBTAIN DATA FROM YOUR USAGE
Messages sent by other messaging apps are usually accompanied by behavioral and user data, which is transmitted in the background. By analyzing this data, other parties may be able to infer who was in contact with whom, at what time and how often. This data may also include user status and profile pictures.
OTHERS CAN'T VIEW YOUR MESSAGES
On other apps if network traffic is not sufficiently encrypted, external parties will be able to intercept it and view the contents of messages. Both foreign intelligence agencies and criminal organizations are keen to intercept network traffic, and have the means to do so.
NO CONFIDENTIAL INFORMATION IS OUTSIDE YOUR CONTROL
On other apps data may be transmitted to an external server even before other messaging apps are fully installed. Whether and for how long messages are stored on the server depends on the individual messaging app.
OTHER APPS STORE YOUR DATA ON THEIR SYSTEMS
You organization neither manages the server nor has an overview ofthe data that have been transmitted to it. In addition, such data may be stored on servers in foreign countries, in which case different laws and regulations apply. This potentially allows third parties to access and share the data without permission. Foreign intelligence agencies may request such data if they are stored on servers which fall under their jurisdiction. By consequence, your organization is reliant on the security of a third party with which you have not entered into an agreement.
NUNYA_lite is an encrypted text SMS message system that enables the user to secure instant messages using password cyphering. NUNYA_lite allows the user to send and receive secure messages with selected partners. The passwords are held by the users and no one else. All messages sent and received by Nunya are stored in a cyphered fashion and cannot be viewed without your keys.
THIS IS WHAT YOU SEE ==>
THIS IS WHAT IS SENT ==>
Download FREE Nunya Phone book on Google Play
NUNYA_lite is teamed with its own phone book which allows you to enter the name, number and type of cypher used for each secure contact.
The PHONE BOOK allows NUNYA to automatically code and decode messages with others. No mess. No fuss. Just set up your contacts and NUNYA will do the rest. The phone book is secured with your personal password so the contact data can only be accessed by you. NUNYA messager does not operate without the phone book.
SECURE PHONE DIALER:
The Nunya Phonebook is equipped with an automatic dialer feature. Select a phone entry then hit the red phone ICON and Phonebook will dial the contact.
PHONE CALL LOG
Calls made to contacts in the Phonebook are deleted from the CALL LOG and any received calls from contacts in your Phonebook are also deleted. The Phonebook will not delete missed calls or calls made from your regular phone dial program. This feature allows you to maintain a list of contacts encrypted on your phone that is secure and the phone log will not show those contacts or their numbers.
NUNYA_lite is the password only FREE version of Nunya. Nunya can communicate using a wide variety of secret code keys. Each of these code key systems vary in security levels, including a 4096 bit RSA public key system built right into the PHONEBOOK and NUNYA system.
Password – First level security:
Cypher and de-cypher messages using a personal password of no less than 7 characters. We improved the password system to include a one time transmission key. Each message is encrypted with a new transmission key so even the simple password feature is super powerful.
User Key File – Second level security:
Any file to be used as a key to cypher and de-cypher. The user selected key file can be any document, picture, music, text or work file.
Crypto Key File - Third level security:
This is a key file created by the either the Windows PC Cypher key maker or the Android Cypher key maker that utilizes the Pseudo-Random Number Generator (PRNG) to create a very large set of random numbers. The Crypto Key maker utilizes several system features such as time, key strokes, and many other variables to randomly seed and create large keys using a mathematical algorithm. The crypto key file is considered to be superior to the User key in that it is much more random.
IMAGE Key File – Highest level security:
The image key is created by using the Android Cypher applications and your camera phone to sample light in three basic colors – red, green and blue. This system is known as a True Random Number Generator (TRNG) because the key is generated by the light recorded by your camera. The image key is the most secure because it is created using quantum physics by recording the values of photons electronically. The image key is similar in performance to keys generated by sensors inside Atomic clocks that detect radioactive decay.
NUNYA can use a 4096 bit RSA asymmetrical stream cypher public key system which auto-links each session.
NUNYA can use a symmetrical stream cypher private key system in a ONE TIME PAD mode. This means that you exchange keys with the individuals you wish to communicate to and use the entire key only ONE TIME.
Android 4.1.2 or later
External SD card 1 Gigabyte or more
Android is a registered trademark of Google Inc.
Windows is a registered trademark of Microsoft Inc.
NUNYA Manual (PDF Format)
How to video - Nunya Encrypted Text Message app
CLICK HERE TO GO TO NUNYA FULL POWER
Business owners - contact us for customized encrypted email and SMS text tailored to suit you. Offer your customers a unique and secure link to your business with our commerical license.