ANONYMOUS & SECURE VIDEOCONFERENCING
Speakeasy
Automate the generation of encrypted videoconferences and access them anonymously through unique, disposable access paths with Speakeasy, Fognigma’s secure videoconferencing solution.
End-To-End Encryption & Anonymity
Speakeasy conferences are hosted within a Fognigma network under the protection of FIPS 140-2 validated, cascading AES-256 encryption. Anonymizing and disposable proxies are generated for each conference to provide a unique access path for each user.
Global Access From Any Device
Users anywhere in the world from any device can access conferences by proxy from any Internet connection.
Full Automation
Speakeasy automatically deploys and maintains any number of videoconferences and access points and destroys them when not in use, ensuring access is always available while reducing cost and reducing digital footprints.
Chat & Screen Sharing
Users can exchange chat messages, share screens, and more to maximize communication and collaboration.
Access Video Chat Securely and Anonymously — Anytime, Anywhere
Speakeasy leverages Fognigma’s Portal Proxy, ZeroProfile, and automation capabilities to provide secure conference rooms and anonymizing access paths for each user. Conference rooms are are completely undiscoverable by any third party, under the protection of Fognigma’s network security and ZeroProfile smart firewall.
SPEAKEASY IN ACTION
Scenario: Secure Global Videoconferencing
An organization has employees working around the world on missions in unsecured locations that are under surveillance. They use Speakeasy to communicate, collaborate, and provide mission updates while avoiding eavesdropping or creating associations between users.
An administrator at the organization’s headquarters deploys an automated Speakeasy conference with a unique access path for each user.
Through unique, anonymizing proxies, users access Speakeasy without creating associations to the server or other users.
The users collaborate with video, chat, and screensharing. When the meeting is complete, the administrator terminates the videoconference and all associated access points.