Security First

Security is Our
Foundation

We've built Froorio from the ground up with security as the primary concern. Here's how we protect you.

Core Principles

Our Security Philosophy

Zero Knowledge

We cannot read your messages, listen to your calls, or access your files. All encryption and decryption happens on your device. We simply don't have the keys.

Minimal Data Collection

We collect only what's absolutely necessary to provide the service. No analytics trackers, no behavioural profiling, no data monetisation. Your data is not our product.

Transparency

Our cryptographic protocols are based on well-audited, open-source libraries. We believe in security through openness, not obscurity.

Protected Data

What We Protect

Messages

All text messages are end-to-end encrypted with post-quantum algorithms.

Voice Calls

Voice calls are encrypted end-to-end. We cannot listen to your conversations.

Video Calls

Video streams are encrypted on your device. Only the recipient can view them.

Files & Media

Photos, videos, documents, and voice notes are all encrypted before upload.

Architecture

Security Architecture

Our multi-layered security approach ensures your data is protected at every step.

Device Security

Encryption keys never leave your device. Local data is encrypted at rest. Biometric protection available.

Transport Security

TLS 1.3 protects all server communications. Certificate pinning prevents man-in-the-middle attacks.

End-to-End Encryption

Kyber768 + Dilithium + AES-256-GCM ensure only intended recipients can access content.

Server Security

GDPR-compliant infrastructure in the EEA. Regular security audits. Encrypted temporary storage only.

End-to-End Encryption Flow

1
You type a message Plaintext on your device
2
Kyber establishes key Quantum-resistant key exchange
3
AES-256 encrypts Message becomes ciphertext
4
Dilithium signs Proves authenticity
5
Sent via our servers We only see encrypted data
6
Recipient decrypts Only they have the key
Responsible Disclosure

Security Researchers Welcome

We value the security research community and welcome responsible disclosure of any vulnerabilities you may find.

If you discover a security issue, please report it to our security team. We commit to:

  • Acknowledge receipt within 24 hours
  • Provide regular updates on our investigation
  • Credit researchers who help us improve (with permission)
  • Not pursue legal action against good-faith researchers
Report a Vulnerability

security@froorio.com

PGP key available on request

Compliance

Standards & Compliance

GDPR

Fully compliant with the EU General Data Protection Regulation

UK GDPR

Compliant with UK data protection requirements post-Brexit

NIST

Using NIST-standardised post-quantum cryptographic algorithms