CryptCom
CryptCom
Each product is designed with user-friendly features and scalable capabilities.
Product Insights
Decentralized Secure Network
CryptCom
Application Features
Encrypted Pictures
Modify pictures (crop, zoom, blur out, or mark-up).
Group Chat
with zero knowledge anonymous groups option, users will not be able see and retrieve group members contact information.
Encrypted Memos
Insert pictures, voice notes, video, or checklists into encrypted note files inside Vault.
High Quality Interface & Easy to use Application
Feature explanations are included within the application.
Encrypted Video
Create and send encrypted videos.
Encrypted Back-Up Option
Data is temporarily backed-up into several encrypted pieces across multiple secure cloud systems, and is only possible to restore with your personal secured password.
End User Support
Accessible within the application and from within the website.
Encrypted Chat & Email Combined Messaging
Hybrid encrypted chat & emails in live chat view with delivered & read notification check marks, delete & edit message functions, text translation, and burn timer for message self destruct from user devices.
Encrypted Voice Calling & Voice Messaging
With secure algorithm voice changer.
SOS Duress Notification
Backwards entry of your PIN simultaneously notifies emergency contacts of duress situation, and wipes messages as well as vault contents from the application.
Text Masking
Text converts to unreadable masked font when device is idle.
Encrypted Vault
For encrypted storage of pictures, video, notes & voice files.
Worldwide Service
Worldwide international data access SIM cards are included.
Devices come with two SIM cards for carrier data redundancy to prevent downtime and enhance coverage.
Easy Set-up
QR Scan initiates activation process, no complicated lengthy loading process; it takes only a couple minutes to activate a handset
Compatibility
Seemless Integration
Cryptcom can communicate with most encryption services available in the market; enjoy being able to carry a single device that accommodates all of your secure communication needs with contacts.
System Security Features
Hidden Security Apps
Device looks like a regular Android phone.
No Fixed Targetable Server Locations
Decentralized Globally, servers destruct every 24 hours after hand-off to a new server, leaving no trace behind
High Level Encryption ECC, OMEMO, AES-256, XMPP
Equivalent to over 15,360 Bit RSA
Anti-Surveillance Technology with auto IMEI changer.
User Controlled & Auto Changing Encryption Keys
Private encryption keys are generated and stored securely on mobile device only. Unique session and per message keys, uses Double Ratcheted algorithm.
Grab Proof
Applications will lockout and hide if device is shaken or grabbed.
High level Authentication protocol using HMAC-SHA256
Application password is hashed into very long password to resist any brute force attacks.
Tamper Proof & Inactivity Wipe Function
Device Tampering and inactivity criteria set by user will cause device to wipe.
Application & Device are Not Updateable Via Push Updates
For added security, no over-the-air push updates are possible from any systems.
Burn all Device Data with PIN Sequence
Use PIN sequence to quickly and securely remove all application content and messages.
Secured Handset
CryptCom Secured Handset
Cryptcom deploys a secure Mobile device manager (MDM) within the smartphone which is autonomous, only on the device without any remote server dependency such as with typical commercial MDM systems which leave remote access backdoor vulnerabilitie
Encrypted Hidden Partition on device
Regular looking handset with standard looking applications. Enter Encrypted Partition using a secret PIN inside the Phone Dialer.
No Backdoor access to device or application possible
Devices are not updatable via push updates, therefore no 3rd party is able to force an unauthorized update that could deteriorate security to Cryptcom loaded smartphones.
Rotating IPs
Chat sessions connected via random proxy servers to ensure the user’s IP locations are kept private. IPs continuously change.
IMEI Changer
Device will advertise a changing IMEI, it is auto changing to prevent surveillance.
Grab Proof
Device auto logs out if grabbed from users hands or device gets shaken or jolted.
Secure Firewall
All end-points are secured. By design, no unauthorized data flow can pass the secure firewall. Device only allows whitelisted authorized data flows and applications.