Secure business communication — handling company data confidentially

Sid Confi Talk With Snowden At Blue Yard Capital Event Berlin
Image captured on the BlueYard Capital event in Berlin, June 1st: The mission to upgrade the internet & an open conversation with Edward Snowden — Decentralized & Encrypted

As some big companies do not want to have their data stored externally or even on servers located in foreign countries, secure communication may also be seen as a must have feature when dealing with business partners. The transfer of sensitive data and communication must be taken more seriously in the B2B sector and cannot be sacrificed over the convenience or feature-richness of unsafe Web applications that use unencrypted data storage.

Secure team communication is essential for journalists and lawyers who handle a great deal of sensitive information. But it is also important for everyone dealing with contracts, sales figures, balance sheets, pending patents or general information subject to protection of privacy, who should protect their data, by only transmitting over a secure network.


A modern communication system for everyday work must be safe, simple, efficient and fast. That's Sid. Sid is built upon a robust, secure and intelligent technology that allows users without any technical skills to set up a decentralized network of contacts and teams to exchange encrypted messages and files instantly.

The application was specifically developed to guarantee maximum data security for team communication. In contrast to storing everything in the cloud, Sid relies on end-to-end encryption in a decentralized network to ensure maximum data security for business operations. In this network, Sid merely supplies the connection between the devices while the actual data is shared with chosen users, linked to each other over a peer-to-peer network. The complete transfer chain is encoded with a strong trusted encryption, so only the communication partners with the corresponding keys can decrypt and read the sent data. So data or chats over this network are only in the hands of those with permission and cannot be read by anyone else.

Especially large files are transferred impressively fast, which is one advantage of the decentralized network structure Sid puts up automatically. Sid sends the data directly from one device to another, via peer-to-peer connection, while automatically detecting whether the devices are located within the same local network (LAN, WLAN) or not. If it is not necessary to send data over the internet, the data will never leave the local network of the company. In addition, the data sent is not stored on any central server somewhere in the internet but it always keeps being safe end encrypted on the devices connected via Sid — another safety feature that increases the transmission speed further — unbeatable when compared to server based Web applications.

Most common communication solutions use a signup process that expect the entry of private data like email address or telephone numbers. Sid is different. Setting up Sid only takes seconds and it can be used without the indication of any private data. For that Sid has its own address scheme, the so called Sid address which is formed by the given username and appended with an asterisk (*) and a 5 digit unique number. This means that your favorite username is always available and you keep full control over who you make contact with: This prevents SPAM before it happens.

As Sid is available for all platforms and devices, it enables a simple, spontaneous exchange of files between different operating systems. Even single users can transfer any file type between all their devices by pairing them with their Sid address.


Sid consistently uses end-to-end encryption for each message and file that is transmitted. The secret keys are generated directly on the device and only stored there or distributed through secure channels among them. Unlike other password systems, the private key is used for the authorization and authentication of contacts, teams (groups), team members and devices.

Whenever keys are exchanged between communication partners, asymmetric key exchange is used. Sid uses Curve25519 elliptic curve for all key exchanges, where the secret keys for each communication end-point is unique.

For all stream/transfer encryption Sid uses Salsa20 from renowned cryptographer Daniel J. Bernstein, who is also the creator of Curve25519. For the implementation of Curve25519 and Salsa20 algorithm the unmodified and audited C reference implementations are used.

Stream encryption is always in place and can not be turned off.

I use Sid — of course. My Sid address is headkit*11214 and it is printed onto my business card next to my phone number and email address. Sid is free. Give it a try! Looking forward to your contact requests!

×