uncompromising SECURITY & privacy.

Multiple layers of protection to keep your data secure and your team in control. Learn more below.

Benefits

multi-layered end-to-end encryption

Mode

1. x4dh

Key exchange involves the combines use of four Elliptic-Curve Diffie-Hellman schemes (ECDH).

2. double ratchet

Provides backward and forward secrecy for communication data with a regularly renewing shared secret.

3. post-quantum

Future-proof data protection using CRYSTALS-Kyber post-quantum protocol for key encapsulation.

security

desiged to protect your data

data sovereignty

You control the keys and the data security.

Mode helps you keep control of your data security. No third party, including Mode, has access to your team's communications.

post-quantum readiness

Migrate team communication to post-quantum security.

Using CRYSTALS-Kyber to protect your key exchanges, protect your team's communication data today against quantum-enabled cyberattacks.

secured stored data

Protect your team's information stored in Mode.

Your communication data isn't stored on Mode servers, so information sharing starts and ends where it's supposed to. Then it's protected the way you need to.

Password protected

SALT & argon2 password hashing

aes-gcm for data encryption

password attempts limit & inactivity timeout

advanced brute-force protection

Related Features

MORE ABOUT MODE'S SECURITY

FAQ

Frequently asked questions

Here's what people often want to know.

WHAT IS POST-QUANTUM ENCRYPTION?

Post-quantum encryption prevents quantum computers from being used to access your data. RSA and ECC are currently secure, but quantum computers using qubits could eventually break modern encryption, jeopardizing data security. Using complex mathematical equations, post-quantum encryption resists the power of quantum computers.

HOW IS MODE DIFFERENT THAN WHATSAPP, TELEGRAM, OF SIGNAL?

Organizations prefer Mode over consumer end-to-end encrypted communication apps for several reasons. The Mode portal allows quick onboarding of team members, control over workspace access, and the ability to set global IT policy settings. Additionally, Mode provides enhanced security features and avoids using shared identifiers like phone numbers for contact creation.

WHAT ENCRYPTION DOES MODE USE?

For end-to-end encryption, Mode employs a multi-layered encryption scheme. It encrypts communication data with AES-GCM and strengthens it using an advanced implementation of elliptic-curve Diffie-Hellman with the CRYSTALS-Kyber post-quantum protocol. For further details on the security protocols,  you can request our whitepaper.

IS MODE AVAILABLE ON DESKTOP AND MOBILE?

Yes! Mode is available for desktop on Windows, Mac, Linux and for mobile on iOS and Android. You can connect your desktop app and mobile app for multi-device account access.

meet with an expert

Learn how Mode can improve your cyber incident response plan.