All network communications in the Sudo system use transport level encryption. This includes HTTPS communications between MySudo and Sudo Platform:
Initial app registration
Sending and receiving Sudo-to-Sudo and Sudo-to-nonSudo communications
Receiving notifications from the mobile device platform.
Transport level encryption is also used between Sudo Platform and other service providers, such as:
Telephony services for Sudo-to-nonSudo communications
Email services for Sudo-to-nonSudo email
In addition to the transport level encryption, Sudo-to-Sudo communications, which include voice calls, messages and email, are also encrypted end-to-end. Because the encryption keys are not stored on any intermediate servers, it isn’t possible to decrypt the Sudo-to-Sudo communications in transit between the MySudo applications.
Sudo-to-nonSudo communications (SMS/MMS or voice calling with non-Sudo phone numbers and email with non-Sudo email addresses) pass through the regular telecommunications networks. Those messages are not encrypted end-to-end by MySudo, and may be visible to third parties and susceptible to monitoring beyond the control of Sudo Platform.
*A third party is an entity other than MySudo user, their device and Anonyome Labs. Anonyome Labs has no control over third party security and privacy policies.
Article is closed for comments.