Skip to content
On this page

The Call Flow ⚙️

Understanding how HushCircuits orchestrates your secure conversations is key to appreciating its privacy by design. Our unique bridge protocol ensures your identity remains protected throughout the entire call.

The HushCircuits Bridge Protocol

At the heart of every secure call is our proprietary bridge protocol. This isn't just a simple connection; it's a carefully choreographed sequence designed to anonymize your communication from start to finish.

Visualizing the Flow

The diagram below illustrates the three-party call control (3PCC) model used by HushCircuits. Observe how your device (YOU) connects to our secure HUSH bridge, which then independently establishes a connection to your TARGET. At no point is a direct link established that could compromise your identity.

BRIDGE PROTOCOL

How your call connects securely

📱
YOU

Leg A

1

We call YOU first

🌐
HUSH

Bridge

2

Then TARGET

📞
TARGET

Leg B

1

Your phone rings

Answer to connect

2

Bridge established

Secure tunnel active

3

Target called

With your spoofed CID

BRIDGE PROTOCOL: ACTIVE

Step-by-Step Explanation

  1. Initiation (YOU ➡️ HUSH): When you initiate a call through the HushCircuits interface, our system first calls your device. This establishes the first secure leg of the bridge. Your identity is already protected as you are connecting to our secure endpoint.
  2. Bridge Activation (HUSH 🔄): Once you answer, the HushCircuits bridge activates. This acts as an intermediary, a digital veil between you and your target. All voice traffic is securely routed and processed here, including any real-time voice modulation.
  3. Target Connection (HUSH ➡️ TARGET): Simultaneously, or immediately after your connection, the HushCircuits bridge independently calls your intended TARGET. To further protect your anonymity, we can present a custom, anonymized Caller ID (CID) to the target.
  4. Secure Conversation: With both legs of the bridge established, your secure conversation can proceed. All communications flow through the HushCircuits bridge, ensuring your direct identity is never revealed to the target.
  5. Ephemeral Disconnection: Upon completion, the connections are securely terminated. In line with our ephemeral records policy, call metadata is purged after a defined period, leaving no persistent traces of the connection.

This intricate dance ensures that while you can communicate freely, your privacy remains absolute.