https://www.talkshade.com/app/app.apk
Latest .apk
(may 7, 2025)
Google Play Store Apple Play Store

Latest .apk
(may 7, 2025)
TalkShade - The Ultimate Communication System TalkShade - The Ultimate Communication System

FAQ

I want that if someone accidentally or voluntarily accesses my smartphone they don't notice that I'm using TalkShade.
Download and install the customized version of the app specifying the icon and the fantasy name that will appear on the display The icon must be a square image of the recommended size of 300 x 300 pixels

I want to be able to call without my interlocutor knowing my alias to call me back
In the control panel, it is sufficient to configure the calling alias as "call only" and use another alias (not to be communicated to the interlocutor) to be called by others

I want a specific alias to be able to receive only but not call
In the control panel, simply configure the alias as "receive only"

I want to communicate with one or more people in a secure manner by controlling their ability to call and answer
You must create a specific account with access enabled by token via email and activate the aliases to assign to your correspondents here
In this case, it is necessary to create the account with a real and accessible email address
Then enable the "token via email" option
Every time you want to access the account, in addition to the email and password, you will receive an OTP via email to use to access the management panel
In this case, while the correspondents will use email and password to log in and communicate, you will be the only one to access the management panel to control the characteristics of their aliases.

I suspect that my mobile device is infected with spyware. How can I communicate safely?
In this case, you need to have a second device that you just purchased, that is, without any additional application installed and without a SIM card inserted. This device will only use the TalkShade app and will be able to connect to the Internet through the suspect device active in "hot spot" mode.
You will need to take care to position the suspect device at a distance and in such conditions from the second one so that the microphone and video camera cannot acquire personal information to communicate to third parties.