• Čeština
  • English
  • Čeština
  • English


What does Talkey do?
Talkey secures e-mail communication, files and folders so that only the creator and the recipient of the message can read/view/open them. Nobody else can get to the communication or computer. However, the way you use e-mail will not change for you. Several extra icons appear in the e-mail client to trigger security processes. Talkey also allows you to encrypt safely copy to USB flash drive, cloud storage, etc. However a potential data robber will not be able to read these files.
Why encrypt e-mails?
When you send an e-mail it leaves in fully open form ( which means it's readable by anyone it meets) to your web hosting (Seznam, Google) and then to the web interface where it passes through other serves up to the server hosting e-mail addressee services. To send an e-mail is very similar to sending postcards. Look at your e-mail communication in recent days and stop by those messages whose content should be seen only by their addressee - wouldn't a registered letter be better to their own hands? Even password protected attach files or encryption enabled on e-mail server is not helpful.
How can I communicate encrypted?
How does it work on the sender's side? If the sender wants to communicate securely with someone else, he simply writes him an email message.  After he clicks send, Talkey automatically detects if the recipient already has their decryption key. If the key doesn’t exist, a window for entering the recipient's mobile number will pop up. After filling the mobile phone number, Talkey will generate a unique decryption key for the recipient and will send a password in the sms message for reading encrypted messages. How does it work on the recipient's side? The recipient can read encrypted messages for free and without the need to install the application. The message will be decrypted in a secure web browser after entering the password from the sms message. For the ability to answer encrypted, recipient need to click the reply button and according to the instructions download the free application Talkey.
How to switch from the Talkey version and become a Talkey Premium prepaid user?
The transition is simple. In the Talkey application, in the My account section, click on the Buy subscription button. You will be redirected to https://talkey.com/en/buy/ . After paying the subscription amount, all functions will be activated. There is no need to set up application again or generate new keys. You must have the current version of Talkey 3.0 or higher, therefore, please check for updates. Updates are available in the Talkey application in the About section. Alternatively, you can update Talkey using the installer found on our website at https://talkey.com/en/installer/ .
Synchronize drafts

To ensure the security of your messages, you must turn off automatic draft saving. The message is encrypted at the same time it is sent, until it is open, just like normal unsecured e-mail.

These drafts can be synchronized to the e-mail server in an open form.

Can another Talkey user with their Talkey device open an e-mail of file that is intended or another user?
He can not. E-mails and files can be decrypted only by recipients and senders for whom the e-mail or file is intended. No one else, including TALKEY a.s. , gets to them. To decrypt communication it's necessary to have a private encryption key that only the recipient and the sender have.
Are my e-mail, filer or folders really safe, even they are saved on a server or computer?
Talkey - encrypted e-mails, files and folders are really safe and you don't have to worry about them. They are open only when they are decrypted on the computer. Files are safe on a mail server or cloud storage and unknown device without a private encryption key can not read them.
Can I trust Talkey?
Yes, you can. Because only you own your part of the encryption key which is necessary to decrypt files and texts you send. To Talkey's technology trust multinational corporation and security forces in the Czech Republic.
Does Talkey have a backdoor?
No, it doesn't. Our company doesn't have access to your data, your private (decryption) key or your Talkey password. If you lose, destroy, make mistake several times in writing down your password, you can only restore your decryption keys from a backup created while creating a new decryption key. You will become only person with access to your data.
What happens after the subscription of Talkey Premium expires?
If your subscription expires, the functionality of the system will be limited to the features in the Talkey version. You can work in this mode unlimited time. You will still be able to read all encrypted messages. You decrypt your encrypted data with files and folders and you won't lose them.