Subscribe to GEN
Login to GEN
GEN has for many years been a provider of secure communication services to businesses who understand how weak traditional communications actually are. SIP when using 'hosted' solutions is almost always sent in the clear and interception is childsplay. Messaging like WhatsApp and Signal, whilst once thought to be secure, clearly aren't anymore. Platforms like MS Teams, Zoom etc have again and again been shown to be weak and provide little or no protection.
GEN has a long heritage in high security, and employs this wealth of knowledge to create genuinely secure communication solutions for businesses, including ourselves. We do not merely sell these services; we rely on them daily for our own internal operations. This same battle-tested architecture is provided as a managed service to a wide selection of enterprise clients across the globe, from financial institutions to high-security consultancy firms.
All external computers (Laptops, Desktops, Mobiles, etc) join a zero trust WireGuard mesh. Once connected, communication services are loaded on top, those being:
This means that our internal communications are absolutely guaranteed to be secure, be that calls, email, messages, attachments, files, and services.
At GEN, we believe that the confidentiality of our customers' data is paramount. We recognise that implementing "genuinely secure" systems introduces operational friction. It is certainly easier to use a public cloud messaging app or an unencrypted VoIP provider, but "easy" is rarely "secure."
The ubiquity of insecure communications does not legitimise them. Cloud telephony providers and consumer messaging platforms have invested billions in marketing to normalise practices that would have been considered reckless a generation ago. The argument that "everyone uses it" is not a security strategy—it is an abdication of responsibility. Organisations that rely on these platforms fall somewhere on a spectrum between unaware of the risks and consciously choosing convenience over security.
There is also an uncomfortable geopolitical dimension to consider. From a state-level perspective, the widespread adoption of clear-text signalling and weakly-encrypted voice communications presents a significant intelligence opportunity. When an entire business ecosystem routes its communications through centralised cloud infrastructure—with signalling often transmitted in the clear and encryption keys held by the service provider—the result is a surveillance-friendly architecture that benefits state actors, not the organisations using it. This is not conspiracy theory; it is the logical consequence of architectural decisions made by platforms whose business models depend on data access and metadata monetisation.
We deliberately choose the path of maximum protection, even when it presents operational challenges. This commitment ensures that sensitive client discussions, strategic planning, and proprietary data remain shielded from prying eyes. For our enterprise clients, this means total peace of mind, knowing that their communications are not being harvested, analysed, or intercepted by third parties, service providers, or state actors.
The landscape is littered with examples of why "standard" encryption is insufficient. We have seen:
These breaches prove that unless you control the entire stack—from the network layer to the application layer—you are at risk.
Our commitment to security is not just a matter of principle; it is a core requirement of the regulatory environments in which we and our clients operate.
Under Section 5 of the GEN Framework Agreement, we are contractually obligated to maintain rigorous security standards. This section mandates that all communications and data handling must meet specific criteria for integrity and confidentiality, ensuring that every interaction within the GEN ecosystem is protected by default.
Our architecture is designed to exceed the requirements of several key pieces of legislation:
By consolidating these requirements into a single, hardened communication fabric, GEN provides a service that is not only technically superior but also fully compliant with the most demanding global regulatory standards.
Our double-encryption architecture—combining WireGuard at the network layer with application-layer encryption (SIP-TLS/SRTP and Matrix E2EE)—provides a level of cryptographic protection that exceeds established military and governmental security standards.
WireGuard employs ChaCha20 for symmetric encryption with Poly1305 for authentication, combined with Curve25519 for key exchange and BLAKE2s for hashing. This cryptographic suite is approved by the NSA for protecting Top Secret information under the Commercial National Security Algorithm Suite (CNSA) and its predecessor, NSA Suite B. The double-encryption approach means that even if one layer were theoretically compromised, the second layer maintains absolute confidentiality.
The principle of defence in depth dictates that no single security control should be relied upon exclusively. By encrypting at both the network layer (WireGuard) and the application layer (TLS/SRTP/E2EE), we ensure that:
This approach provides quantum-resistant characteristics through algorithm agility—if one cryptographic primitive is compromised, the second layer maintains protection whilst migration occurs. This forward-looking design ensures that communications remain secure even as the cryptographic landscape evolves.
If your organisation handles sensitive communications—whether that's client data, strategic planning, or proprietary information—then genuinely secure communications should be a priority. Our team can assess your current setup, identify vulnerabilities, and implement a solution that meets your security requirements without unnecessary operational overhead.
Contact our team to discuss how GEN's secure communications platform can protect your business.