With an end-to-end encryption, a message is only visible to the sender and recipient users. It is not possible for intermediate components, including the server, to decrypt the messages. Each message uses a different encryption key. This makes it impossible to decrypt past or future messages in the event of an attack, even if mobile or desktop devices should be compromised.
End-to-end encrypted internet-based voice and video calls are made over a secure communication protocol.
The clients' unique keys, phone numbers and user information are signed by a corporate certificate authority that has been given to the organization.
The clients then check the signature. An SMS verification is not used during registration. This way, the user cannot become a member of the system without having his/her registration information verified by an authority designated by the organization.
Thus, MITM (Man in the middle) attacks and fake identity attacks between client and client are prevented.
In ULAK.IM, messaging, signaling, voice and video call traffic are all encrypted in order to have a secure communication path with the server. The Transport Layer Security (TLS 1.3) protocol is supported and a secure communication between server and the client is ensured.
Before ULAK.IM users start messaging, encryption keys known only to them are securely generated by the Diffie-Hellman Key Exchange. While users are talking, the Diffie-Hellman process is repeated for each message exchange. This way, the encryption keys used during the conversation are constantly changing.
TreeKEM is a scalable and end-to-end encrypted security protocol developed with new technologies. ULAK.IM is one of the world's leading secure communication applications using this technology. This system supports end-to-end encryption in large groups using tree algorithms and enables a fast encryption of messages.