Aera Global
Eve Talk implements patented technology originally invented to secure the communications of both military and emergency response services in the US, Europe, and the Middle East, during mission-critical operations.

Real end-to-end encryption ensures that no one, including Aera Global, knows the content of your calls and messages, and can not collect, process and transfer this data to third parties.

Eve Talk

Messenger with the highest level of privacy and security

Seen 24 Oct 11:41
Kbg09df24jtnk9 ;lk!3 lk}v9 6:fyum08!ci_9 1Miok s0-k
24 Oct 11:40 Sent
Is it strong enough?
How can i make sure the message is encrypted?
Eve Talk combines and directs data packets via random routes in random order to make data interception and decryption mathematically impossible.

Technology

Premium servers in Switzerland and the most secure countries protected by a layer of robust AES 256-BIT XTS encryption and unprecedented physical security.
AES
Advanced Encryption Standard (AES), developed by NIST, is a popular widely used public encryption standard. Known for being remarkably resilient against attempted breaches, AES is used by security services, governments, financial institutions, and other organizations around the world.

AES is regarded as one of the most robust encryption methods in existence. Data encrypted following this method will demand multiple security keys to retrieve the data in its original form.
XTS
XTS is a "block cipher" where the data is divided into 128-bit blocks before scrambling it with 256-bit keys. In this scenario, disks store data in a particular way, and disk sectors are divided into blocks which are the same size as blocks encrypted by a block cipher.

The scrambling process involves 14 different rounds of encryption to ensure that your data remains truly unrecognizable. Organizations that use XTS block cipher mode are guaranteed full disk encryption.
256-Bit
Data breaches occur when bad actors employ brute force by using all possible key combinations to force decryption. In response to this threat, 256-bit encryption emerged.

With this approach to encryption, every bit you add will double the number of possible keys creating an infinite number of key variations. As the time and computing power to try all the different key variations are staggering, it would take over a billion years to break even a 128-bit key.
Encrypted VPN
An encrypted Virtual Private Network (VPN) enables users to send and receive information through networks securely.

This technology essentially creates a secure tunnel between two devices (typically the server and the client) where the data is encrypted when entering the tunnel and decrypted when it exits the tunnel.
AES
Advanced Encryption Standard (AES), developed by NIST, is a popular widely used public encryption standard. Known for being remarkably resilient against attempted breaches, AES is used by security services, governments, financial institutions, and other organizations around the world.

AES is regarded as one of the most robust encryption methods in existence. Data encrypted following this method will demand multiple security keys to retrieve the data in its original form.
XTS
XTS is a "block cipher" where the data is divided into 128-bit blocks before scrambling it with 256-bit keys. In this scenario, disks store data in a particular way, and disk sectors are divided into blocks which are the same size as blocks encrypted by a block cipher.

The scrambling process involves 14 different rounds of encryption to ensure that your data remains truly unrecognizable. Organizations that use XTS block cipher mode are guaranteed full disk encryption.
256-Bit
Data breaches occur when bad actors employ brute force by using all possible key combinations to force decryption. In response to this threat, 256-bit encryption emerged.

With this approach to encryption, every bit you add will double the number of possible keys creating an infinite number of key variations. As the time and computing power to try all the different key variations are staggering, it would take over a billion years to break even a 128-bit key.
Encrypted VPN
An encrypted Virtual Private Network (VPN) enables users to send and receive information through networks securely.

This technology essentially creates a secure tunnel between two devices (typically the server and the client) where the data is encrypted when entering the tunnel and decrypted when it exits the tunnel.

Core Features

Make secure calls with exceptional voice quality, even with slow internet connection speeds based on TETRA over IP.
Secure Voice Calls
Seen 24 Oct 11:41
Is it strong enough?
How can i make sure the message is encrypted?
Secure Messages
Exchange true end-to-end encrypted messages with all sensitive message data encryption and decryption taking place entirely on the user device.
Eve Mode
Seen 24 Oct 11:41
Kbg09df24jtnk9 ;lvk!3 lk}v9 6:fyum08!ci_9 1Miok s0-k
Eve Mode
Protected Eve Environment for sensitive calls and messages that requires users to press Eve Mode button to preview messages or receive calls.
How can i make sure the message is encrypted?
Send confidential messages that are erased automatically after a selected period of time.
Self-Destruct Messages
The message will be erased after the set time
Seen 24 Oct 11:41
Timer
Additional protection and comfort without analogues. Specially designed for our clients.

Premium Features

Account Takeover Detection
Only you can log into your account and view sensitive data using your device only. If there is any outside attempt to take over your account, you will be immediately notified in the Eve Talk app and the intruder's device will be blocked.
Multi-Channel Data Transfer
Data is encrypted, scrambled and pushed through plurality of media channels and nodes. Such an approach makes message interception futile, and your private calls wiretap-proof.
Control Encryption Keys
You can choose how exactly you want to exchange encryption keys with your Eve Talk contacts. Key exchange can be carried out in-person via Bluetooth and QR code scan, or remotely using a secure voice call.
SIM Swap Protection
Eve Talk uses a unique fingerprint of your device to ensure your data protection in situations when SIM card is compromised, lost, or duplicated in an attempt to bypass multi-factor authorization.
VPN
Private VPN with the strongest AES-256 cipher encryption with SHA512 auth and a 4096-bit RSA key allows to take back the control of your privacy. Servers are located in over 63 countries and 110 cities. We can't personally identify you based on IP and timestamp. We do not store any connection or session logs and IP timestamps that can identify you or monitor your activity.
Gateway
Eve Gateway delivers AI-driven Zero Trust Network Access (ZTNA) to protect the application at the network level. It reduces surface attack areas, prevents lateral movement and unwanted application discovery, secures the connection between your protected environment and servers.  
MDR
Reduce the risk of endpoint vulnerability exploitation with the Eve MDR (Managed Detection and Response) services, which provide detection, diagnosis, monitoring and response to the real-time cyber threats and security incidents. It includes premium XDR solution, JSON-based detection and response protocols, LimaCharlie’s cloud system and advanced Hunting capabilities with the support for YARA and Sigma rules managed by the Eve team of the top level cyber security specialists. We combine the XDR with the industry’s best endpoint protection and deep learning technology (advanced form of the machine learning). Together they detect both known and unknown malware without relying on signatures and block the vast majority of threats.

Next gen anti-virus and anti-ransomware protection includes a technology that detects malicious encryption processes and shuts them down before they can spread. Any files that were encrypted are rolled back to a safe state.

Advanced protection technologies disrupt the whole attack chain including deep learning that predictively prevents attacks. By taking away the key tools hackers love to use, Eve MDR stops zero-day attacks before they can get started.

Eve’s cyber security team responds with the maximum efficiency to all the deteted threats based on predefined protocols to achieve unmatched endpoint security.   
Eve Eye
Eve Eye detecting and alerting of unwanted exposure of your data and protecting against external cyber threats. We monitor in the real-time and track billions of data sources, domain registrations, social networks, blogs, closed forums, code repositories, dark web and recently issued certificates on every corner of the internet to identify the data leaks related to your Phone number, IP Range and IPv6 Address.
to try premium features

Plans

For Industry
Signature
Group Call: 3
Media File Size: 1Gb/file, 50Gb/month
Hack Protection: VPN
For Special Operations
Black Armor
Group Call: 5
Media File Size: 2Gb/file, 50Gb/month
Virtual Number: Israel
Hack Protection: VPN, MDR
For Everything
Shadow
Group Call: 10
Media File Size: 4Gb/file, 80Gb/month
Virtual Number: Swiss/Germany/UK
Hack Protection: VPN, MDR
Eve Eye: Phone/IP Range/IPv6/Address
For Everyone
Persona
Group Call: 3
Media File Size: 1Gb/file, 50Gb/month
For Deals
Confidence
Group Call: 5
Media File Size: 2Gb/file, 50Gb/month
Virtual Number: Israel
Hack Protection: VPN
Custom Plan
For Your Purposes
All Talk Features and Customizable Extra Protection
Talk Features
Group Call
Media File Size
VPN
Virtual Number
MDR
Eve Eye
Support
Plan
Installation
Per month
Signature
All Features
3
1Gb/file, 50Gb/month
+
09:00-17:00
14£
21£
Persona
All Features
3
1Gb/file, 50Gb/month
09:00-17:00
17£
09:00-21:00
Israel
+
2Gb/file, 50Gb/month
5
All Features
Confidence
21£
25£
24/7
+
Israel
+
2Gb/file, 50Gb/month
5
All Features
Black Armor
28£
45£
24/7
Phone/IP Range/IPv6/Address
+
Swiss/Germany/UK
+
4Gb/file, 80Gb/month
10
All Features
Shadow
63£
80£

Encrypted

by EVE
Mail
Encrypted Mail
Encrypted Calls
Call
Cloud
Encrypted Cloud