SDKs and APIs designed for storing and retrieving device-encrypted data and in-app chat conversations let you work with easy-to-understand primitives, like vault data and messages, instead of low-level protocols.
Your Usual Toolkit.
Start building with the skills you already have. Get unstuck quickly with your usual debugging tools, supplemented with our detailed documentation and if needed, our support services.
Whether you are still deploying a prototype, or you are already supporting a massive public app ecosystem, Qredo cloud platform employs a horizontally scalable, service-oriented architecture that supports any growth.
Automatic and Instant Failover.
While merely seeing incoming and outgoing data as zero-knowledge blobs, Qredo makes sure copies of that encrypted data is stored across redundant components for instant failover.
We needed our users to trust our app to store their most personal information, and retrieve it on any of their other devices. And, we didn’t want to be liable for holding that information!
Qredo was the logical choice.
Marek Pasternak CEO, CryptoNotes
They're your Keys!
The user’s data is protected by a set of keys that are under the user’s control. For a mobile app, these keys are stored securely on the device. Every piece of data stored in Qredo’s data store and every message sent or received by the user is encrypted with these keys.
Cloud Security Agnostic.
Even if the cloud storage is compromised or the messages are intercepted, no one can read the contents. The user is in control of their data and can choose who they share it with. The security and privacy of data protected by Qredo does not depend on security in the cloud.
” Even if the cloud storage is compromised or the messages are intercepted, no one can read the contents!
SDK ft. Key Management.
Qredo uses a hierarchy of keys that protect your users’ data and communications. Different keys are used for different purposes and are dynamically created on demand for new services. Key management is one of the most difficult aspects for security apps to implement, but with Qredo, key management is all handled within the SDK.
We work hard to ensure that the keys are secure and recoverable on the user’s phones, tablets, and other computing devices on which Qredo apps are running, while making it easy for the user to transfer the keys between those devices.
Privacy and Open Source.
When it comes to privacy, we don’t expect you to take our word for it. Qredo uses industry standard encryption algorithms and the Qredo SDK source code is available on request, so you can see for yourself how it is implemented. We have also opened up our code base to third party auditors, so you can be sure that everything has been checked and tested thoroughly.
Want to know more?
Register to receive our detailed cryptography guide.