MTN NAMCHAT delivers certified, military-grade, end-to-end encryption for secure voice and video calls, conference calls, instant messaging, and large file transfers.
Secure, Encrypted Voice, Video and Conference Calls, Instant Messaging,
and Large File Transfers
Instant, Secure Conference Calls
Start an encrypted, secure conference call from your device at any time.
1
Select participants from your phone’s contacts list
2
Press call and a secure bridge is created, connecting you directly
3
The other participants get a message to join the call
Secure Instant Messaging
MTN NAMCHAT provides secure instant messaging with the ability to send photos, videos, voice notes, and large files of any kind. All messages and files are end-to-end encrypted with a new key generated for every message or file sent and MTN NAMCHAT ’s enhanced Data at Rest encryption protects all files and media stored within the app.
Group messaging for collaboration and file-sharing can be created locally by the user on their device.
Secure Voice
and Video Calls
MTN NAMCHAT voice and video calls are fully encrypted end-to-end, with signal obfuscation, and are routed through the mobile device’s data connection. Advanced codecs ensure HD quality with low data and battery use, even across low-bandwidth mobile or wireless networks.
Secure calls can be made over any IP-based network, including 5G, 4G/LTE, 3G/HSDPA, 2G/EDGE, WiFi, and satellite networks, with full authentication of all parties on a call, eliminating the risks of impersonation through Caller ID spoofing.
Secure Conference Calls
A conference bridge can be established instantly from the MTN NAMCHAT app by creating a group of contacts and hitting the call button. With only mutually authenticated, authorised users, MTN NAMCHAT conference calls eliminate the need for participant PINs and passwords.
Works on
Any Device
With native client apps for Apple iPhone and iPad, Android smartphones/tablets, and Microsoft Windows devices, with no additional hardware dependencies, MTN NAMCHAT can be downloaded from the Apple or Google app stores for immediate use.
The ability to work anywhere, from any device, with file sharing, messaging, and voice/video calling allows users to collaborate instantly and securely.
Certified, Military-Grade
End-to-end Encryption
1. NIAP Architecture
All cryptography is run through a NIAP architecture. The outermost layer with all server links being secured with TLS using NIST validated algorithms (ECC-384 and AES-256)
2. Obfuscation
All data - voice, video, messages, and file attachments - are first obfuscated using the ChaCha20-256 algorithm to mitigate any future potential AES vulnerabilities. This occurs before the data is encrypted through the NAMCHAT crypto core.
3. CNSA
The obfuscated data is secured end-to-end using a package of Elliptic Curve Cryptography (ECC) and Symmetric-Key Cryptography that meets or exceeds the key length standards of the Commercial National Security Algorithm (CNSA) Suite for Top Secret communications.
Certified, Mutually Authenticated,
Military-Grade End-to-End Encryption
1. NIAP Architecture
All cryptography is run through a National Information Assurance Partnership (NIAP) architecture, where the outermost layer (with all server links) is secured with TLS using National Institute of Science and Technology (NIST) validated algorithms (ECC-384 and AES-256).
The implementation of NIAP architecture meets the standard for Top Secret communications on the US government’s networks.
2. Obfuscation
The obfuscated data is secured end-to-end using a package of Elliptic Curve Cryptography (ECC) and Symmetric-Key Cryptography that meets or exceeds the key length standards of the Commercial National Security Algorithm (CNSA) Suite for Top Secret communications.
3. CNSA Cryptography
All data - voice, video, messages, and file attachments - are first obfuscated using the ChaCha20-256 algorithm to mitigate any future potential AES vulnerabilities. This occurs before the data is encrypted through the NAMCHAT crypto core.
NIAP Tunnel Architecture
Quantum-Safe End-to-End Encryption through a NIAP Tunnel Architecture