Every Catenis message is encrypted by default using the Advanced Encryption Standard (AES). AES has been adopted by the U.S. government and is now used worldwide. As is common in public/private key cryptography when a message is sent, the message encryption is done using the public key of the recipient application represented by its virtual device. When logging encrypted content the public keys of the virtual device that is performing the logging are used. For a message to be read it must be decrypted using the private key of the recipient’s virtual device (Bitcoin private key). A new public-private key pair is generated for every message thread. Each message from the sender is encrypted with a new public key belonging to the recipient ensuring that message adheres to Perfect Forward Secrecy standards. Once transmitted, not even the sender can read the message after it is encrypted, only the recipient can. Furthermore, if an application requires messages to be unencrypted, customers can override the default settings and send messages unencrypted. When encryption is performed by using the logging functionality only the device that logged the message can read it (decrypt the message).