Cryptedphone installs a military-grade level of encryption and security on its devices for a total defense of your data
HOW SECURE ARE CALLS AND MESSAGES SENT FROM YOUR MOBILE PHONE?
Your communications can only be private if they are encrypted. Encryption is the process of making the information unreadable to anyone who does not have the key to decrypt it. Unlike the alternatives present on the market today, Cryptophone provides its devices with an unassailable and resilient multi-level encryption to deal with every possible threat and intrusion attempt that encrypts not only the communication channels but also the device.
get your crYptophone now
Fill out the form and a member of our cybersecurity team will contact you to help you get your cryptophone quickly and securely.
your privacy above all
The phone is encrypted both as an operating system and as voice and chat applications, with military 256-bit encryption, end to end. This prevents, even the owners of the infrastructure, from decrypting calls and / or messages, since the encryption keys are generated by the end-points and are different for each message or call.
The phone is encrypted with the following: AES-256-GCM for data, AES-256-CBC for metadata
Applications are system apps, i.e. applications inserted directly into the secure ROM. This gives greater security in the event of complex attacks where servers and application update infrastructure are compromised, in which the attacker is able to recompile applications with malicious code. In these cases the update with the malicious code is not successful but is rejected, giving an error such as POP-UP.
Furthermore, these devices use the hardware Titan-M Chip mounted on the SoC to perform security checks when the phone is booted, and create a chain of digital certificate trust, starting from an AES-256 token installed on the TITAN-M chip (the generated token is saved on our off-line infrastructure, also encrypted with AES-256).
The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.