CryptCom 

CryptCom

Each product is designed with user-friendly features and scalable capabilities.

Product Insights

Decentralized Secure Network

CryptCom utilizes a cutting edge decentralized network, with use of systems simultaneously spread across many geographic locations globally. For added security and to maintain its decentralized nature, systems used for relaying encrypted communications auto delete and move daily.
CryptCom uses a sophisticated secure Dynamic VPN that constantly changes with perpetually Rotating System IP’s.

CryptCom

Application Features

Encrypted Pictures

Modify pictures (crop, zoom, blur out, or mark-up).

Group Chat

with zero knowledge anonymous groups option, users will not be able see and retrieve group members contact information.

Encrypted Memos

Insert pictures, voice notes, video, or checklists into encrypted note files inside Vault.

High Quality Interface & Easy to use Application

Feature explanations are included within the application.

Encrypted Video

Create and send encrypted videos.

Encrypted Back-Up Option

Data is temporarily backed-up into several encrypted pieces across multiple secure cloud systems, and is only possible to restore with your personal secured password.

End User Support

Accessible within the application and from within the website.

Encrypted Chat & Email Combined Messaging

Hybrid encrypted chat & emails in live chat view with delivered & read notification check marks, delete & edit message functions, text translation, and burn timer for message self destruct from user devices.

Encrypted Voice Calling & Voice Messaging

With secure algorithm voice changer.

SOS Duress Notification

Backwards entry of your PIN simultaneously notifies emergency contacts of duress situation, and wipes messages as well as vault contents from the application.

Text Masking

Text converts to unreadable masked font when device is idle.

Encrypted Vault

For encrypted storage of pictures, video, notes & voice files.

Worldwide Service

Worldwide international data access SIM cards are included.
Devices come with two SIM cards for carrier data redundancy to prevent downtime and enhance coverage.

Easy Set-up

QR Scan initiates activation process, no complicated lengthy loading process; it takes only a couple minutes to activate a handset

Compatibility

Seemless Integration
Cryptcom can communicate with most encryption services available in the market; enjoy being able to carry a single device that accommodates all of your secure communication needs with contacts.

System Security Features

Hidden Security Apps

Device looks like a regular Android phone.

No Fixed Targetable Server Locations

Decentralized Globally, servers destruct every 24 hours after hand-off to a new server, leaving no trace behind

High Level Encryption ECC, OMEMO, AES-256, XMPP

Equivalent to over 15,360 Bit RSA

Anti-Surveillance Technology with auto IMEI changer.
User Controlled & Auto Changing Encryption Keys

Private encryption keys are generated and stored securely on mobile device only. Unique session and per message keys, uses Double Ratcheted algorithm.

Grab Proof

Applications will lockout and hide if device is shaken or grabbed.

High level Authentication protocol using HMAC-SHA256

Application password is hashed into very long password to resist any brute force attacks.

Tamper Proof & Inactivity Wipe Function

Device Tampering and inactivity criteria set by user will cause device to wipe.

Application & Device are Not Updateable Via Push Updates

For added security, no over-the-air push updates are possible from any systems.

Burn all Device Data with PIN Sequence

Use PIN sequence to quickly and securely remove all application content and messages.

Secured Handset

CryptCom Secured Handset

 

Cryptcom deploys a secure Mobile device manager (MDM) within the smartphone which is autonomous, only on the device without any remote server dependency such as with typical commercial MDM systems which leave remote access backdoor vulnerabilitie

Encrypted Hidden Partition on device

Regular looking handset with standard looking applications. Enter Encrypted Partition using a secret PIN inside the Phone Dialer.

 
No Backdoor access to device or application possible

Devices are not updatable via push updates, therefore no 3rd party is able to force an unauthorized update that could deteriorate security to Cryptcom loaded smartphones.

 
Rotating IPs

Chat sessions connected via random proxy servers to ensure the user’s IP locations are kept private. IPs continuously change.

 
IMEI Changer

Device will advertise a changing IMEI, it is auto changing to prevent surveillance.

 
Grab Proof

Device auto logs out if grabbed from users hands or device gets shaken or jolted.

 
Secure Firewall

All end-points are secured. By design, no unauthorized data flow can pass the secure firewall. Device only allows whitelisted authorized data flows and applications.

Scroll to Top