About us

CIPHR

Encrypted Phones

Comunicate with us
CID FE19B32C

REALLY PRIVATE CONTACTS - CIPHR

CIPHR IT CAN APPLY TO:

Encrypted phones Samsung
J3, J5, J5 Prime, J7, A3, A5, A7, S6, S6 Edge, S7 Edge, S8, S9

Encrypted phones BlackBerry
Q10, Q20, Z10, Z30, Leap, Classic, Porsche 9982, Porsche 9983, Passport

Encrypted Phones

Dedicated sales support and technical support professionals available seven days a week

Ciphr
Important improvements over PGP solutions

THE KEYS ARE CREATED BY THE USER

Unlike the old PGP solutions where an administrator creates their key, we allow users to generate their key on the device. This eliminates the ability of the company to read messages or deliver unencrypted messages to an authority. We can not reveal something we do not have access to.

FORENSIC ANTI-INVESTIGATIONS MODEL

One of the biggest threats to the old PGP solutions is the forensic extraction of data from the device. With the old PGP solutions, all messages including deleted messages can be retrieved (since the last cleaning of the device). The new solution keeps your messaging data in a secure container (AES-256) that is constantly overwritten and cleaned to protect against a forensic attack of deleted data recovery. The Blackberry 10 platform also benefits from stronger device security that resists forensic attacks.

COMPLETE MESSAGE CONTROL

With legacy PGP solutions, once a message is sent, the author immediately loses control of it. These messages could be stored, manipulated or transmitted to another recipient. The new solution offers senders full control over message retention times through the Message Burning feature. The Burn feature erases the message from the sender’s and the recipient’s device after a predetermined amount of time. The forwarding, storage and copying of burned messages has been blocked.

KEY REGENERATION

Older PGP solutions have a key to your entire subscription. This means that, if your password is compromised, all past and future messages will be revealed. The new solution allows you to regenerate your key as often as you wish, protecting all subsequent messages with a new private key.

ENCRYPTED LINE OF BUSINESS and DATA ATTACHED TO CONTACTS

The old PGP solutions send the subject of the unencrypted email and the contact attachment is sent out of the body of the message also in encrypted form. We have addressed this major security flaw, so the subject and the attachments are protected by the same encryption as the body of the message.

MESSAGING OFF-THE-RECORD (Out of records) (OTR)

Cutting-edge cryptography is used to encrypt each message with a unique private key. This means that, if a key was compromised, only one message would be revealed (Perfect Secret Forward). The keys are destroyed after they have been used, which also creates a situation in which a researcher could not recognize the author of an intercepted message (Plausible Denial). Group chats with up to 50 participants are also available.

TWO SECURE CHANNELS

Our secure email network hosted separately from our OTR infrastructure, this means that, in case of an unexpected interruption in a location, you can still make use of the second channel. For particularly sensitive conversations, we encourage users to break the conversation between the two channels (for example: the question is sent by email, and the response is sent through OTR). This makes deciphering a conversation much more difficult for an attacker

Ciphr is a mobile platform of privacy for communications
important in devices Blackberry and Android for work “AFW”.

All the data that you enter in this site are 100% protected for your security, only for use of information request.