The file should automatically download to your device.
Having trouble downloading? Click here
This paper provides an in-depth look at the security features of
’s remote access product, Pro. We at
do not believe in security through obscurity, nor do we expect our customers to blindly accept our claims to important security features, such as end-to-end encryption. By publishing the details on how the security mechanisms work and interoperate in our products, we are also inviting the public to scrutinize our efforts.