Skip to content

Cryptaphone -
The Architecture

Cryptaphone has been designed from the ground up, specifically with anonymity, advanced encryption and privacy in mind.

To achieve this, we had to remove some of the existing features that you find on most encrypted phones, and added a totally different way to communicate.

Mobile Phone shown with Credit Card, User Profile and Password Graphics

Cryptaphone Security Features

Mobile Phone shown with Credit Card Graphic

Access Defender

Access defender is designed to prevent the following password attacks though a unique patented process

Cryptaphone Access Defender shown in use on an iPhone

*MPS technology prevents large data mining to discover passwords

Interested in Cryptaphone?

Cryptaphone architecture summary in 3 steps

Architecture

1. Encryption keys are never stored on device or server

Almost all authentication technology stores your private keys locally for authentication purposes, Cryptaphone does not, keys are never stored locally or on the server, which means there is no key to hack/ steal to access your data anywhere.

Additionally, you can use very sophisticated keys and multiple keys for each conversation. With high entropy key generation, the keys used are impossible to predict or guess by systems trying to crack encrypted data.

Mobile Phone with shield graphics
Mobile Phone with padlock graphics
Architecture

2. Anonymous groups

The full layout and design of the system is anonymous, no device unique identifier is every used or sent to our servers. The server data is so heavily encrypted that we don’t even need to protect it from reading. However, we do anyway. We could hand over all the data we store the server to anyone, and it would not be possible to recover any data, or identify any phone.

All phones are given a world unique code, which is changed every time you reset the data or forget your passwords. We never use any phone unique identifier in any way shape or form.

Architecture

3. Data

Data in Cryptaphone undergoes several levels of encryption, encoding and compression. Many forms of cryptography are used to achieve this level of data protection. Although the transmission and storage of the data does not need to be encrypted because of the secure architecture; we do it anyway.

Multiple levels and types of cryptography are used, throughout the technology. On failed authentication a pre-set number of times, or by the user selecting to wipe all data, the system uses an advanced process to wipe the applications data in a way that is designed to keep your information secure, however as the data is encrypted with a key that does not exist on the device, it would be impossible to recover any data.

Mobile Phone with security graphics

Interested in Cryptaphone?