Perzo is an “uncrackable encrypted messaging service”, keeps the likes of NSA out


In the light of Edward Snowden’s recently disclosed scandalous revelations about NSA’s surveillance prowess, tech giants, individuals, and governments are agitated to keep their data private, and are in search of a solution that could rescue them from the surveillance dilemma. Although, tech giants can circumvent spying since they have state-of-the-art IT departments which can conjure a number of solutions, but to a common citizen there is no reliable getaway as trust has receded in big tech corporations.

Perzo is, as declared, an escape from government surveillance. Perzo is developed by David Gurle, who has an extensive career time at Skype, Microsoft, and Thomson Reuters among others. It is worth noting here that David Gurle was a powerful force behind Skype, and he is one of those people who made Skype what it is today. With Perzo, people can safely exchange emails and files.

Perzo works as a source of communication that utilizes avant-garde decryption and encryption exploits to keep messages and files completely hidden from intruding surveillance hacks and exploits. The messages exchanged through Perzo are converted into nonsensical text by cryptographic encryption. The key to the cryptographic code is produced from the text of the message itself.

David Gurle has to say the following about Perzo:

“We’ve developed a new technology that looks at your messages and, randomly, a set of characters from it, then goes to the next message to generate a new key using that message’s characters, and so on. Every single message sent through Perzo is encrypted using its own key.”

“We can’t see what you’re doing. If you lose your password, it’s practically impossible for us to retrieve it, and that’s by design. And if the government asks us for our data, obviously we’ll comply, but we have no way to help them make sense of the encrypted message.”

The best feature of Perzo is that the messages are hidden from Perzo itself, unlike other messaging services. In a hypothetical but an extremely likely situation, if Perzo were coerced into sharing its messages with NSA and other surveillance agencies, all Perzo will have in its hands to submit will be loads of data of jumbled or garbled text. Perzo is designed in such a way that all third parties, including Perzo, can’t decode messages.

I believe, Perzo will be the hot-shot in tech-town, if it fulfills what it promises. The part worth looking forward to is that such innovative services pave the way for better future technologies. However, this is a big “if”. We’ve all heard of claims of being uncrackable before and we’ve all learned that never is anything uncrackable, either due to technical restraints, legal issues, or otherwise. Perzo is aiming for a first.


Related Posts


Leave a Reply

Your email address will not be published. Required fields are marked *


  1. AFPhy6

    This is an exciting concept/service to me. I hope it pans out to be as good as it appears from my first researching of it.

    If anyone sees anything more about it, especially in the realm of the precise methodology they use to protect messages at each stage, Please Please, link to that source.

  2. Louis

    [@Bamboo] Steady now :-) Technically, if you just focus on that sentence, you are correct, in that as written, the word ‘scandalous’ does refer to the revelation, and not to the actual surveillance, which would be the case if the sentence was wriiten like this : “In the light of Edward Snowden’s recently disclosed revelations about NSA’s scandalous surveillance prowess”.

    However, I’m pretty sure after reading the whole piece, from the context i had the impression the writer actually referred to the surveillance itself being scandalous.

    @Henry H : I was just about to type the same thing !!!! These public statements are always to be closely examined — I agree fully : If it truly wasn’t possible for them to ‘retrieve’ a lost password, they would have stated so in no uncertain terms. That carefully worded phrase implies that in their algorythm is included the ability to ‘retrieve’ the lost password — which is obviously just a euphemism for “able to decrypt your message without you giving us the password”… aka a backdoor.

    Of course, this criticism must have been repeated everywhere countless times, and have no doubt reached the developer (whose idea, if it truly would be without a backdoor, I definitely would support) — so if that gentleman would be so kind as to make another public statement clearing all this up, as just a little misunderstanding, I would believe him…

    but hundred bucks says his lawyers won’t allow him to …

  3. Bamboo

    Quote – In the light of Edward Snowden’s recently disclosed scandalous revelations about NSA’s surveillance prowess (End quote)
    It’s easy to see which side you’re on matey, but most everyone else, USA or abroad, private citizen, company or Government are very very pleased he did expose the scandal – not his, but NAS’s. Seems you’re in the minority on this one – and that’s yet another scandal.

  4. Geoski

    I am in total agreement that the government has absolutely no right, and no implied privileges to intrude and/or violate an individuals privacy. The only exceptions should be court approved based on solid evidence that illegal activity of some type is involved.

    Having said all that, we do live in times of increased threats from internal and external sources. Coordinating a terrorist attack among individuals in different countries is no longer a major undertaking, even for a small and unknown splinter group.

    Access to weapons of mass destruction by terrorist groups, either chemical or biochemical is not to be taken lightly.

    I am not trying to present a scenario of sheer panic, or in any way an excuse for mass invasion of privacy. I guess that crafting a policy that would satisfy the privacy issue, and national security concerns is like walking a tight rope. Loosing balance between the two can result in dire consequences.

  5. Darcy

    Will Rogers once said; “Be thankful we’re not getting all the government we’re paying for.” Looks like that’s no longer true. I applaud this attempt to restore our privacy guaranteed under the law.

    More and more I see the truth of James Bovard’s statement; “To blindly trust government is to automatically vest it with excessive power. To distrust government is simply to trust humanity – to trust in the ability of average people to peacefully, productively coexist without some official policing their every move. The State is merely another human institution – less creative than Microsoft, less reliable than Federal Express, less responsible than the average farmer husbanding his land, and less prudent than the average citizen spending his own paycheck.”

  6. DoktorThomas™

    This is a much needed solution. Every IT mind in the world should be focused on developing similar software for every computer/digital use, especially those without situs in the USA and its territories. This is a goldmine opportunity with sales potential greater than hated MSFT and the dreadful Fruit company.

    It is extremely doubtful any American IT team for any giant has an answer to the problem they helped create. Even Gruggle [sic] finally said NSA penetration of its data storage was illegal. Ya think? Boobs in charge.

    When government wants to break the law, it is the responsibility of every citizen to oppose that infraction(s). No IT department said “No!”, except lavamail. Those other IT hacks actually conspired with NSA to break the law. Never forget who they are.

    Disclaimer: Law abiding citizens have nothing to hide; privacy was bestowed upon them by an authority greater than any mere government. A government that fails to respect and honor that is already dead and deserves and receives the respect of no one. Its fate is as sure as the rising sun.

  7. Henry Hollingsworth II

    I’m not worried about a search function mate, if me files can be really encrypted.

    This part from Gurle has me a bit on edge however:

    “it’s practically impossible for us to retrieve it,”

    “Practically” impossible? I was hoping for “totally” impossible… just a thought

  8. Bub

    The encryption mechanism they use looks tough to beat. But I think that only applies to their storage. The other party to your communications may not be as secure, and there may be opportunities to intercept messages en route.

    Also, there are likely disadvantages to the extra encryption. For example, gmail has excellent search capabilities, so it is easy to find some mail from three months ago about some random topic. With this level of encryption, I doubt that Perzo can offer a robust search like that. Or if they do, it probably means that they have a less secure index.