Frequent questions

Frequent questions

Our multiple servers are based in jurisdictions that are committed to strong privacy laws, we continuously monitor and evaluate our server locations to ensure the privacy of our customers.
Ciphr servers are based on nodes and are located in different areas around the world. The servers mentioned are in countries that do not reside in the jurisdiction of the United States or NATO. The locations are in countries that are subject to their own local privacy law only. When it comes to stored data, all inputs and outputs are true end-to-end encrypted. Our servers only start the tunnel.

Ciphr can be applied to the following devices:

Samsung J3, J5, J5 Prime, J7, A3, A5, A7 S6 S6 Edge S7 Edge, S8

BlackBerry Q10, Q20, Z10, Z30, Leap, Classic, Porsche 9982, Porsche 9983, Passport

Ciphr operates in more than 30 countries with more than 50 resellers. Contact us to find our distributor closest to you.

Keys are created randomly on your device. Only you, the customer, are always in possession of your passwords or the necessary passwords to unlock them.

Nothing can be linked since we use a BES decoy email that is used to protect the device with the IT policy. The email accounts and OTRs used are never registered anywhere outside the encrypted Ciphr applications.

The OTR group chats are completely encrypted. Each member of the group receives an individual message encrypted with its key. This allows us to have up to 50 participants. The OTR services of the competitors use a public key system that admits only 10 participants. In addition, they share a key, so if the key is compromised instead of a meaningless message, all the group chat will be decrypted.

Delays in sending email are due to large emails with attachments and also to poor / slow connections.

Ciphr  leaves no stone unturned when acquiring this state-of-the-art technology to ensure a reliable and advanced network infrastructure that has 100% uptime. Capacity for use has been continuously monitored and has never been a problem due to our infinitely expandable infrastructure (IEI). It’s like exceeding your expectations when it comes to the promised performance of technology.

Yes, 100% YES. A quantum computer uses the concept made famous by the Schrödinger cat, superposition, to simultaneously store a one and a zero in each of its bits. In a true quantum computer, each of these so-called qubits would be entangled, so three qubits simultaneously represent the eight binary numbers from 000 to 111. As more qubits are added, this becomes more powerful but also harder to maintain . If you make it work, however, it has been shown that a true quantum computer would solve certain problems (BQP) which are difficult for us today, but are easily solved by quantum algorithms. This is when security and privacy people begin to get involved-according to the Shor Algorithm, today’s most popular encryption algorithms will be especially vulnerable. That said, we took into account all the scenarios and techniques available when we were building Ciphr from scratch.
Ciphr defends you against attackers using Post-Quantum Elliptical Curve Cryptography (PQ-ECC ™), an industry-leading security offering that adds a future-proof layer resistant to the most powerful encryption tools available today. day. Hypercore uses PQ-ECC ™ to encrypt each message with a Post-Quantum (PQ) key in addition to the stronger Elliptical Curve Cryptography (ECC) and key exchanges that our customers already expect.

Do not

Just send us a message through our contact page Make sure to leave behind a PGP email.

The entire CIPHR platform is built from scratch by our own cryptographers, programmers and network architects, including both text servers. We are also the only company that has implemented Quantum Encryption on top of an elliptic curve encryption. We are also the only ones we use.

Yes, all current Smartphone have GPS. However, the IT policy that controls Ciphr devices Samsung Knox and Blackberry 10 completely disables and blocks GPS tracking services.

Samsung Knox and Blackberry 10 are government-grade business systems that are approved for government use at the highest levels. Both undergo extensive penetration tests constantly and are considered safe enough to communicate state secrets and other sensitive materials.

Both platforms have been tested in CELLEBRITE and OXYGEN forensic data recovery software. The same used by top-level data recovery companies and governments. It is impossible to recover data from Samsung Knox and Blackberry 10 devices activated by the company. Regardless of this, we offer remote cleaning capabilities for added protection and peace of mind. Ciphr guarantees that unauthorized people will never access your data, try it! If you lose your device for some reason, you do not need to panic. All you need to do is get in touch with us as soon as possible so that we can immediately help you get back online, delete your lost device and delete data from it. There is absolutely no charge to delete your device remotely or to reactivate your account. However, you may need to buy a new device in case your device has been damaged, broken or lost.

OTR ECC messages, such as email, pass through our servers only for transport. There is no key server with OTR. The keys are deciphered in the device with a mathematical challenge, and the key is destroyed and a new one is created for each message. There is no way to link an OTR account to a Hypercore device since the application is in the security zone and no account registration is necessary. In addition, all metadata can be secured with curve 44417 ECC we use.

Many things can affect the connectivity of a device. Before attempting anything else, the user must first reboot the device. If it still does not work, here’s a list of things to try:

  • Settings: Make sure that the settings are configured to allow data connectivity and data roaming (both must be enabled).
  • APN: Make sure that the Access Point Name is set correctly for the SIM card that is being used.
  • Roaming countries: Make sure you are roaming in a country covered by the roaming agreements for your specific SIM card (you can also check in my account).
  • Activate: Make sure your account has not been deactivated.
  • Carrier: Sometimes certain telephone networks may be in trouble or have problems. Go to network settings and try to connect to a different provider if possible.
  • Network mode: In some countries, there are different network technologies available (4G, 3G, 2G). You can access network settings and force your device to connect to a “lower” technology for more stable connectivity.

The message delivery system for Ciphr Mail and Ciphr Text is such that messages are not delivered until the application is opened after the password is entered. This means that messages can not be delivered to your device without your password. This limits the amount of data stored on the device.

After receiving the payment, we can send the devices within 3 days almost anywhere in the world. In some cases, depending on the location, we offer the local pick-up option in one of the facilities of our reseller partners. However, we can configure everything and have it working for a couple of hours. Also if you already own a Samsung device or BlackBerry 10 and have an active data connection.

Ciphr comes with the applications Ciphr Mail, Ciphr Text and Vault. We offer you packages with an advanced subscription of Hypercore of 3, 6 or 12 months. Prices may vary depending on the device you choose and if you already have a device. If you prefer to buy a device also from us, we offer you that without any charge.

PQ-ECC ™ or “Post Quantum ECC” is an encryption method added to our basic ECC coding that wraps and encrypts the system in an extra layer using Lattice Quantum Encryption. Basically, another layer of the trellis algorithm resistant to the quantum computer.

Yes, with Ciphr you can use the Ciphr Mail application to send pgp emails.

Not in the very near future, but in recent days mobile forensic tools and more advanced techniques use the computing power generated by quantum computers for decoding messages on encrypted mobile phones. A Ciphr can only support the mentioned hack attempt when it comes to all the encrypted mobile phones available in the market today.
Our e-mail program, Ciphr mail uses ECC (15,360 bits) but with the compatibility to also communicate with the old PGP (RSA 4096 bits). We use triple layer encryption (AES, ECC TLS).
Our Text Ciphr chat program uses advanced ECC coding in OTR format. Our ECC algorithm curve used is the safest ECC curve currently available in the market. We are the only company that uses the ECC 448 curve with PQ-ECC above it. Our Ciphr Text application secures your data with a force of 28,800 bits!
In addition to the aforementioned, the use of a Ciphr device with Text Ciphr, Ciphr Mail and Vault is intuitive with power functions that give the user an incredible experience.