Frequently Asked Questions (FAQ) – PENA

1. Why PENA?

PENA is a communication app designed for people who prioritize privacy, security, and complete control over personal data.

PENA allows users to:

PENA is built on the core principle of privacy. PENA also does not collect user data in any form. The entire system is designed with the highest level of security standards and next-generation encryption technology, including protection against threats that do not exist today.

We cannot view, store, or access your messages, and do not have the ability to read or record any communications that occur within PENA. All data and activities are completely under the control of the user.

All messages, communications, and data can only be viewed and stored by you. PENA does not own, does not store, and does not control any information from user activities within this application.

PENA are also referred to as Super Apps, as users can:

This is the main feature of Super Apps: multi-functional, one ecosystem.

2. What sets PENA apart from other chat apps?

Main differences of PENA:

In short: PENA has no data to leak or tap.

3. Is PENA truly anonymous?

Yes. PENA does not request and does not store:

From the first time it was used, users immediately communicated anonymously.

4. How does the encryption system at PENA work?

PENA Chat uses next-generation encryption technology, namely 3.20 F (Post-Quantum) Encryption. This technology is designed to provide a level of security that goes far beyond the encryption of typical messaging applications. This encryption system is specially prepared to deal with future security threats, including the development of Quantum Computing, so that user communication remains secure in the long term.

Meanwhile, PENA Wallet uses 3.20 W (Post-Quantum Cryptography) Encryption which is applied to protect users' digital assets. This technology is designed to be resistant to quantum computing threats, thus providing maximum protection for Bitcoin wallets, assets. The entire wallet security system is built to ensure that only the owner has complete control over his assets.

5. What is 3.20 F (Post-Quantum) Encryption?

3.20 F (Post-Quantum) Encryption is an advanced symmetric encryption architecture used by PENA Chat, and is designed as future-ready encryption to deal with future security threats, including the development of Quantum Computing. In essence, this encryption is created to protect communications today to keep them secure in the future.

6. What is 3.20 W (Post-Quantum Cryptography)?

The 3.20 W (Post-Quantum Cryptography) Encryption on PENA Wallet works with a multi-layered encryption system that runs entirely on the user's device. Data and digital assets are encrypted using a very high level of security and are protected by post-quantum cryptographic mechanisms designed to be resistant to quantum computer attacks. Private keys never leave the device and are not stored by PENA, so only the wallet owner has full control over their assets, today and in the future.

7. What is the account recovery system at PENA?

PENA uses the recovery phrase as the only method of account recovery.

This system ensures that only the user has full control over his or her account, without any party interference.

8. Can PENA help recover your account if the recovery phrase is lost?

Nope.
Because PENA does not store account data, passwords, or recovery phrases, PENA does not have the technical ability to recover user accounts.

This is a consequence of the high-level privacy and security system (self-custody security) implemented by PENA.

9. Why does PENA use CAPTCHA during initial registration?

CAPTCHAs are used to protect the PENA system from abuse, such as:

CAPTCHAs are not used to identify users and do not collect personal data.

10. Do CAPTCHAs affect user privacy?

Nope.
CAPTCHAs only serve as verification that the registration is done by humans, not bots.
PENA does not store identity data from the CAPTCHA process.

11. What does Real Peer to Peer (P2P) mean?

Real Peer-to-Peer (P2P) is a network architecture in which the user's devices are directly connected to each other, without going through a central server as a communication intermediary.

In the Real P2P system:

12. What's the difference with regular P2P?

Many apps claim to be P2P, but in practice:

Real P2P on PENA is different, because:

13. How Does Real Peer to Peer (P2P) Work in PENA?
14. Why is Real P2P Important?

Because:

Real P2P makes PENA resistant to surveillance, data leaks, and system abuse.

15. Does PENA store messages or calls?

PENA:

All data is only on your device.

16. Does PENA have cloud backup?

PENA deliberately does not provide cloud storage or backups.

Consequences:

This is a security design choice, not a limitation.

17. Is PENA safe from malware?

PENA has a built-in anti-malware system for the files it receives.

Free Member: Standard security mode with a high level of encryption that keeps users private for everyday use.

Premium Member: The mode with the highest level of protection designed for users with maximum security needs.

In this mode, users get additional features in the form of:

18. Does anti-malware read the content of my messages?

Anti-malware only scans files for technical threats, not the content of the communication.

19. What is the function of a VPN on PENA?

The VPN in the PENA application serves to protect the user's internet connection, disguise IP addresses, and add a layer of privacy and network security. This VPN is part of Ultra Secure Mode to ensure that users' communications and digital activities remain safe, anonymous, and protected from network threats.

20. Is PENA free?

Yes, PENA is available in a free version with high-level security features that protect your privacy and communications.

Free Member — Secure Mode

Free users still get:

Basic security remains strong even in the free version.

But there is a premium member feature

For users who want extra protection and a more personalized experience, Ultra Secure (Premium) Mode is available with extras such as:

21. What are the advantages of the Premium version?
22. What is the payment and refund system for the Premium Member Feature?

PENA Premium payments are officially made through Google Pay.

Payment System Details

Payments are processed directly by Google Play/Google Pay. Supports a variety of payment methods available on Google Pay, such as:

PENA does not store user payment data, and the entire process follows Google's security standards.

Security & Privacy

Payment information is fully managed by Google. PENA only accepts subscription status (active/inactive). No user financial data is accessible to PENA.

23. What is the refund policy for PENA Premium?

PENA Premium purchases are made through Google Pay and are subject to Google Play's policies.

Refund Terms

Refund requests follow Google Play rules and systems. PENA does not process refunds directly. Users can apply for refunds through their respective Google accounts.

📌 Important Things to Know

Approval or rejection of refunds is determined by Google, not PENA. Once Google's refund policy period ends, payments are non-refundable. Canceling your subscription will stop auto-renewal, but it won't refund the current period fee.

🔐 Privacy & Security

Payment data and refund process are never accessed or stored by PENA. PENA only receives subscription status information (active/expired).

24. Can PENA be used in all countries?

Yes — PENA is designed to be used globally in all countries.
As long as you have:

You can access PENA services from anywhere in the world.

25. What if there is a request from law enforcement?

PENA was built on the principle of privacy-by-design and a zero-access system.
This means that we don't store, access, and can't see the content of messages, calls, files, or user activity.

User Data We Don't Own

Because the PENA architecture is designed as Real Peer-to-Peer (P2P) and end-to-end encrypted, then:

So, there is no communication data that we can submit, even though there are requests from law enforcement.

However, PENA still respects the applicable laws in each jurisdiction:

Any formal requests from law enforcement will be reviewed in accordance with lawful legal procedures. Where legally required, we may only provide limited data that is technically available (if any), without violating the privacy of other users.

User Responsibilities on PENA Chat

The User is responsible for not using PENA either through:

for activities that are illegal, unlawful, or contrary to the regulations in force in any jurisdiction.

User Responsibilities on PENA Wallet

Users are solely responsible for not engaging in Bitcoin activities or transactions that:

Privacy Principles & Consequences

PENA is built with an absolute privacy architecture, where:

content of the conversation,
files and data,
Call,
as well as the user's wallet transaction activity.

We facilitate super privacy, bringing peace of mind and security to communicate and transact – both from current and future threats like Quantum Computing.

However, since this system does not give access to anyone, then:
PENA Chat and PENA Wallet are not responsible for communications or transactions that are found to be unlawful.

Shared Commitment

PENA is here to realize privacy and security.
We invite all users to use PENA responsibly and maintain the good name of the PENA ecosystem, so that the privacy and security that we build can continue to be realized.

26. Does PENA have a backdoor?

PENA does not provide:

Providing a backdoor means undermining the security of all users.

27. Who is responsible for the content of the message?

The User is solely responsible for:

PENA does not moderate the content of communications.

28. What if I delete the app?

Deleting an app means:

29. Who owns the data at PENA?

You
Always you.