Logo Silentel Contact

Secure Conference

Secure conference allows secure real-time voice communication between two and more users with device-to-device encryption.


To make a Secure Conference with Silentel, the user simply selects multiple users from the Silentel contact list. Selected users will receive notification similar to an incoming call. Users will be connected to a conference call after accepting incoming notification.

Other users can be added during the conference itself.

The user can leave the conference at any time and then rejoin it again.

The conference allows you to view the list of participants with the following details:

  • Who received a conference call (or who was invited but did not accept a conference call)
  • Who is currently talking

How is Secure Conference encrypted?

Most conference systems which declare encrypted communication did not provide true end-to-end encryption.

How other systems works? Encrypted communication is established between user and conference server. User's voice stream is encrypted and sent to server. Server decrypts the voice streams received from users and mix it together. Mixed voice stream is encrypted and forwarded to users. And this is wrong, because the conference server is the weak point where the encrypted communication can be intercepted or compromised in several ways.

How Silentel Secure Conference works? Each Secure Conference communication is protected by a unique encryption key which is distributed solely between participants. Voice stream is encrypted before sending and is decrypted only after delivery to receivers (directly in users' devices). Voice stream is mixed directly on users' devices (not by the server or any other part of the system). Data are never decrypted during transfer. Even the Silentel Server never knows the encryption keys and is not able to decrypt the content of Secure Conference communication.

You may also like


How Secure are Proprietary “Secure Phones”?

We look at the current reality of secure phones and assess whether they have a place in this era.

Read more

Messaging Apps and Information Traps: What Are You Using?

Potential risks you take when using a free chat app.

Read more

Through the Backdoor: How Governments Steal Data

The history of cryptography, ciphers and backdoors affects secure communication today. Read more.

Read more