Grig

Delivering True Privacy to the World of Chat

About Grig

Grig is an ambitious project dedicated to the establishment of truly secure communication and its infrastructure on top of Tectum blockchain platform - an absolutely secure Chat Application boasting 12 levels of defense grade protection from unwanted eyes and ears

Benefits of Grig

  • ACCESSIBLE TO EVERYONE

    Suitable for professional, corporate and casual user

  • QUICK AND EASY TO SET UP

    No previous knowledge in cryptography needed

  • SAFE AND SECURE

    Using the latest proprietary technologies to keep your communication safe and secure

  • MULTIPLE SUB-USERS GENERATED BY ONE ACCOUNT

    Activate multiple sub accounts with your Corporate license and create your own communication community

  • FREE CONTEST PARTICIPATION

    Promotional license designed specifically for whose users who enjoy taking challenges to win big

SECURITY FEATURES

  • No phone number is required to activate and use the application.

  • On-device encryption

    The unique Secret Key is generated and kept on a device and not on a server.

  • Single time Secret Key use

    The Secret key is generated only once to accommodate a single tunnel communication: every time new tunnel opens – the new set of Keys is generated.

  • Asymmetric Elliptic Curve Encryption Protocol

    Proprietary encryption algorithm with asymmetric properties, assuring single-device–single-time message decryption event – the message is downloaded only once and on single device only.

  • Sender’s Anonymity

    The recipient receives a notification about the message without any knowledge about who the sender is.

  • Random-BoardTM custom keyboard

    Random-BoardTM custom keyboard works in 2 modes, floating and random symbol placement - designed to disorient key-logging malware by relocating symbols every time user types the button.

  • Distributed Storage

    Once recorded, the message is encrypted and broken down into segments and distributed among random server nodes.

  • Dual PIN Entry Requirement

    The recipient receives an encrypted message only after entering personal PIN code; the message is decoded only after the sender enters the sender’s PIN (through analogue dial channel in paid version).

  • Analogue PIN Transmission

    PIN codes are transmitted over analogue dial channel and are not recognized and not recorded by most surveillance systems (paid versions only).

  • Viewed and Destroyed

    The message is completely erased after being viewed by the recipient.

  • Mock Message View

    The fake message (background picture) is displayed when any user dials the Fake PIN code.

  • Single View Wipe Out

    Secure Tunnel Application uninstalls itself after displaying the message when used in Spy Mode.

app demonstration
Become an Authorized Grig Chat user