Comunicate with us
REALLY PRIVATE CONTACTS - CIPHR
CIPHR IT CAN APPLY TO:
Encrypted phones Samsung
J3, J5, J5 Prime, J7, A3, A5, A7, S6, S6 Edge, S7 Edge, S8, S9
Encrypted phones BlackBerry
Q10, Q20, Z10, Z30, Leap, Classic, Porsche 9982, Porsche 9983, Passport
Dedicated sales support and technical support professionals available seven days a week
Important improvements over PGP solutions
THE KEYS ARE CREATED BY THE USER
Unlike the old PGP solutions where an administrator creates their key, we allow users to generate their key on the device. This eliminates the ability of the company to read messages or deliver unencrypted messages to an authority. We can not reveal something we do not have access to.
FORENSIC ANTI-INVESTIGATIONS MODEL
One of the biggest threats to the old PGP solutions is the forensic extraction of data from the device. With the old PGP solutions, all messages including deleted messages can be retrieved (since the last cleaning of the device). The new solution keeps your messaging data in a secure container (AES-256) that is constantly overwritten and cleaned to protect against a forensic attack of deleted data recovery. The Blackberry 10 platform also benefits from stronger device security that resists forensic attacks.
COMPLETE MESSAGE CONTROL
With legacy PGP solutions, once a message is sent, the author immediately loses control of it. These messages could be stored, manipulated or transmitted to another recipient. The new solution offers senders full control over message retention times through the Message Burning feature. The Burn feature erases the message from the sender’s and the recipient’s device after a predetermined amount of time. The forwarding, storage and copying of burned messages has been blocked.
Older PGP solutions have a key to your entire subscription. This means that, if your password is compromised, all past and future messages will be revealed. The new solution allows you to regenerate your key as often as you wish, protecting all subsequent messages with a new private key.
ENCRYPTED LINE OF BUSINESS and DATA ATTACHED TO CONTACTS
The old PGP solutions send the subject of the unencrypted email and the contact attachment is sent out of the body of the message also in encrypted form. We have addressed this major security flaw, so the subject and the attachments are protected by the same encryption as the body of the message.
MESSAGING OFF-THE-RECORD (Out of records) (OTR)
Cutting-edge cryptography is used to encrypt each message with a unique private key. This means that, if a key was compromised, only one message would be revealed (Perfect Secret Forward). The keys are destroyed after they have been used, which also creates a situation in which a researcher could not recognize the author of an intercepted message (Plausible Denial). Group chats with up to 50 participants are also available.
TWO SECURE CHANNELS
Our secure email network hosted separately from our OTR infrastructure, this means that, in case of an unexpected interruption in a location, you can still make use of the second channel. For particularly sensitive conversations, we encourage users to break the conversation between the two channels (for example: the question is sent by email, and the response is sent through OTR). This makes deciphering a conversation much more difficult for an attacker
Ciphr is a mobile platform of privacy for communications
important in devices Blackberry and Android for work “AFW”.