Optimal Privacy Protection
Integrated End-to-End Encryption
Threema uses tried-and-tested asymmetrical cryptography to encrypt both the communication between users as well as the data transfer between app and server. In contrast to other messaging services, Threema Work not only end-to-end encrypts text and voice messages but also voice and video calls, media files, and status messages.
External experts are commissioned to conduct comprehensive security audits on a regular basis. The most recent audit was carried out by Cure53 in October 2020. Furthermore, German researchers provided a security proof for Threema’s communication protocol Ibex in July 2023.
Consistent Metadata Restraint
Groups and contact lists are managed on the individual user devices, not on a central server. Messages are deleted immediately after they are delivered, there are no log files, and no personal data is collected.
No Address Book Access Required
Threema Work can be used without access to the address book. If contact synchronization is activated, contact data is only transmitted in hashed form and never stored on the server’s disk.