Security and privacy features

Highlight of our security and data privacy protection methods

Our primary goal in designing the PTechnology ecosystem was to protect the communications data, the parties' personal information and privacy.
Although the solution is extremely complex from IT and cryptographic perspective, it is based on two simple principles: protect the communication stream, and save literally nothing.

Enterprise-level communication security combined with a strict data privacy approach

Secure calls, messaging, document and file sending even on your existing phone. Multi-layered external and internal encryptions, other data security and privacy methods guarantees the protection of your personal and business communication.

Highlighed Security and Privacy features

  • Non Peer-To-Peer connections
  • Surveillance (MITM) protection
  • Closed, invisible ecosystem
  • No personal data saved

Closed and isolated ecosystem

The PTechnology Shielded Ecosystem is invisible from the public internet. We do not have any kind of API-s or integration opportunities to avoid the unnecessary vulnerability.

Multi-layered protection ecosystem

Instead of using only a strong encryption, we apply several external and internal layers for protect your communication.

No communication data is saved

Within the PTechnology Shielded Ecosystem, neither communication nor system usage data are stored. To do so, we have all the necessary regulatory approvals.

Non Peer-To-Peer connection

The problem with Peer-To-Peer connection is your communication security depends on unknown transceiver and repeater servers and stations. To avoid this problem, your devices connects directly to our shielded global communication server park.

Man-in-the-middle attack protection

Another level of protection: to protect your conversation, our system automatically broke the line in case of any third party try to listen to your call. Used encryption method: SRTP / ZRTP.

Isolated software environment

Both the Android, iOS and YeaLink's Linux operating systems provides the isolated environment that necessary to run our secure communication protocols and cryptography services.

Global server park

To provide your device the shortest and fastest route to our infrastructure, we use communication servers all around the globe. The servers are connected directly to each other internationally through dedicated, heavily encrypted channels.

Hands-free connection control (NonPry, NPhone)

You can separately control your phone autoconnection from NonPry or NPhone autoconnection to your in-car Bluetooth or hands-free sets. In this way, you can ensure that none of your guests in the car can see your incoming secure calls.

No unnecessary data asked or stored

During a PTechnology account registration, we only need an notification email address. We do not need more Personally Identifiable Data to provide you the service.

No contact list synchronisation

PTechnology's communication servers intentionally do not have a central contact list function for data privacy reasons.

No contact list mapping

Even Signal use contact list mapping to show who is on Signal. PTechnology does not use any contact list mapping, the only people who know your PTechnology Phone number are the people you gave it to.

No central phonebook

Our system intentionally does not include any central phonebook. The communication servers and the servers that manage the client accounts are isolated from each other.

Regular Cybersecurity Audits

The security and integrity of our system is regularly audited by cyber security auditors.

Only three steps to start


Create your account

Choose a user name, and a password for your client admin.


Purchase a licence and the add-ons

Your NonPry is ready to use, while your PPcrypt devices arrive in 5 days.


Plug in your PPcrypt phone and log-in with NonPry,

And you are ready to make your first protected calls from your 7-digit PTechnology Phone Number!

No commitment period, free NonPry / PPcrypt calls worldwide