To keep your data safe, Google Meet uses several encryption methods:
- End-to-end encryption: Masks the data with a code that only you and other participants can access.
- Cloud encryption: Secures your info in transit and at rest in Google's data centers.
- Client-side encryption: Organizations can maintain full control of the encryption keys and add an extra layer of protection. Learn more about client-side encryption.
When you communicate in Google Meet, you can use either:
- Meetings: Create a schedule or join instant meetings with a link. All meetings are cloud-encrypted.
- Calls:
- Meet calls
- Upgraded mobile calls that ring directly to a Google Workspace, personal account, or phone number that is cloud-encrypted.
- End-to-end encryption is available for personal users. Learn about additional encryption.
Learn how to make Meet calls with Google Meet.
- Legacy calls
- You can call a personal account or phone number directly with end-to-end encryption.
- In September 2025, Meet calling will replace legacy calling. Learn about the transition from legacy calls to the new Meet call experience.
Cloud encryption
Learn how cloud-encrypted meetings & Meet calls work
To keep your data secure and private, by default, Google Meet supports these cloud encryption measures for meetings and Meet calls:
- Encrypted in transit between your device and Google data centers.
- Call recordings are encrypted at rest when stored in Google Drive.
- Meeting and Meet calls encryption adheres to:
- Internet Engineering Task Force security standards for Datagram Transport Layer Security (DTLS).
- Secure Real-time Transport Protocol (SRTP).
- Meeting and Meet calls encryption adheres to:
Additional encryption for Meet calls
Users with personal accountsTo enable expanded cloud-encrypted features, Meet Calls are cloud encrypted by default. Your info is encrypted in transit and at rest in Google's data centers.
To add end-to-end encryption, in the pre-call screen, turn on Additional encryption.
- This feature is only available for calls made between users with personal accounts. If you turn on "Additional encryption" and try to make a call to a Business or EDU account, you get this error message: "This person's organization doesn't let them receive end-to-end encrypted calls."
- Additional encryption grays out the cloud-encrypted features that aren't supported in Additional encryption mode, like:
- In-call messages
- Reactions
- Polls
- Q&A
- Add-ons
- The ability to report abuse
The icons shows the encryption type:
- Cloud encryption:
- When you tap the Empty shield
, it shows "This call is cloud encrypted."
- When you tap the Empty shield
- Additional encryption:
- When you tap a shield with a lock inside
, it shows "This call is using additional encryption."
- When you're in a call, it shows a blue lock badge
.
- When you tap a shield with a lock inside
If you have a Business or EDU account:
- The additional encryption toggle isn't available.
- Calls are always cloud-encrypted.
End-to-end encryption
Learn how end-to-end encrypted legacy calls workWhen you use end-to-end encryption, it:
- Adds a security method that provides additional communication protection.
- Is built into every 1:1 and group legacy calls.
- End-to-end encryption is on by default and you can't turn it off.
- Only let people in your call know what you say or show.
- Doesn't allow Google to view, hear, or save the audio and video from your call.
These icons for end-to-end encrypted show in your legacy calls:
- A shield with a lock inside
.
- If you tap this icon, it shows "End-to-end encrypted."
- A shield with a lock inside with a message "End-to-end encrypted"
. The icon disappears when you switch to full screen.
In 1:1 and group legacy calls, end-to-end encryption means a call's audio and video is encrypted from your device to your contact's device. The encrypted audio and video can only be decoded with a shared secret key.
The key:
- Is a number created on your device and the device you call. The key exists only on those devices.
- Disappears when the call ends.
- Isn't shared with:
- Other users
- Other devices
Tip: Even if someone accesses your call data, they can't understand it without the key.
Shared secret keys stay on the callers' devices
- Your device decrypts your call's audio and video with a shared secret key.
- This key is created on your device and your contact's device and is deleted after the call ends. It's not shared with any server.
What's needed for a shared key
To calculate the shared key, each device needs:
- A private key, which only saves on your device
- A public key, which only saves on Duo's servers
The first time you set up or link your legacy calling account, your device creates several private and public key pairs so you're prepared for several end-to-end encrypted calls.
How shared secret keys are created
- The devices exchange their public keys but don't reveal their private keys.
- Next, each device uses its private and public keys from the other device to calculate the shared secret key.
Google servers can't decode your call
When you make a legacy call on Meet, your call's audio and video typically go directly from your device to your contact's device. This connection is called peer-to-peer. The call doesn't go through a Google server.
Sometimes a peer-to-peer connection isn't available, like when a network setting blocks it. In this case, a Google relay server passes your call's audio and video between your device and the device you called. The server can't decode your call because it doesn't have the shared secret key.
Group calls stay private on the server
To ensure your group calls are high quality, these calls are end-to-end encrypted and they go through a Google server that routes everyone's call audio and video to others in the group.
To route your calls, the server uses info about your call, like which device your audio and video come from. It sends each user's audio and video to the others in the group, but it:
- Doesn't have access to end-to-end encrypted keys
- Can't decrypt your media
Group calls use multiple keys
To join a call that goes through a server, your device automatically uses:
- A sender key to encrypt the call's audio and video.
- When someone starts a group call, each device exchanges the sender's key with the other devices.
- A client-to-server key to encrypt info about the call.
- Each device exchanges this key with the server.
What the keys do
The keys work to:
- Encrypt your call's audio and video so only other people in the group can hear and see it
- Decode the audio, video, and info from other people in the group call
Keys can change in group calls
Everyone's devices exchange new sender keys if any of these happens:
- Someone leaves a group.
- A person who wasn't part of the group gets added to it while in the call.
If a person in your group doesn't immediately join the group call, their device can still use everyone's sender keys. This lets them join the call anytime it's live.
When the group call ends, the keys are deleted.