Appearance
The Call Flow ⚙️
Understanding how HushCircuits orchestrates your secure conversations is key to appreciating its privacy by design. Our unique bridge protocol ensures your identity remains protected throughout the entire call.
The HushCircuits Bridge Protocol
At the heart of every secure call is our proprietary bridge protocol. This isn't just a simple connection; it's a carefully choreographed sequence designed to anonymize your communication from start to finish.
Visualizing the Flow
The diagram below illustrates the three-party call control (3PCC) model used by HushCircuits. Observe how your device (YOU) connects to our secure HUSH bridge, which then independently establishes a connection to your TARGET. At no point is a direct link established that could compromise your identity.
BRIDGE PROTOCOL
How your call connects securely
📱
YOU
Leg A
1
⟶ We call YOU first
🌐
HUSH
Bridge
2
⟶ Then TARGET
📞
TARGET
Leg B
1
Your phone rings
Answer to connect
2
Bridge established
Secure tunnel active
3
Target called
With your spoofed CID
BRIDGE PROTOCOL: ACTIVE
Step-by-Step Explanation
- Initiation (YOU ➡️ HUSH): When you initiate a call through the HushCircuits interface, our system first calls your device. This establishes the first secure leg of the bridge. Your identity is already protected as you are connecting to our secure endpoint.
- Bridge Activation (HUSH 🔄): Once you answer, the HushCircuits bridge activates. This acts as an intermediary, a digital veil between you and your target. All voice traffic is securely routed and processed here, including any real-time voice modulation.
- Target Connection (HUSH ➡️ TARGET): Simultaneously, or immediately after your connection, the HushCircuits bridge independently calls your intended
TARGET. To further protect your anonymity, we can present a custom, anonymized Caller ID (CID) to the target. - Secure Conversation: With both legs of the bridge established, your secure conversation can proceed. All communications flow through the HushCircuits bridge, ensuring your direct identity is never revealed to the target.
- Ephemeral Disconnection: Upon completion, the connections are securely terminated. In line with our ephemeral records policy, call metadata is purged after a defined period, leaving no persistent traces of the connection.
This intricate dance ensures that while you can communicate freely, your privacy remains absolute.