Criptyque Limited offers the Pryvate™ application, an ever-evolving communications security solution that is delivered as a downloadable app for ease of use by our customers.
Once you are a part of the Pryvate community you will benefit from real communications security. Initially, across all your voice calls, conference calls, video calls and IMs, along with file transfers such as pictures.
These are our initial offerings, with many more soon to be released to secure your email accounts and internet browsing experiences to name but two.
Yes. Pryvate uses device-to-device encryption technology, meaning only Pryvate™ app users exchange keys for each peer-to-peer call. The keys are not held on a server. Pryvate uses the ZRTP protocol to encrypt the data packets of the phone call across the internet. Pryvate™ uses our secure Pryvate network servers to facilitate the calling service and provide complete security.
You can download the Pryvate white paper on ZRTP to understand the technology used for our encrypted voice, video and conference calling.
Currently if you have a device running iOS version 6.0 or Android version 2.2 then you can use Pryvate. Other platforms will come online shortly. (Windows, Blackberry, Symbian etc)
A MiTM attack is when an attacker sits between two communicating end points, intercepting and forwarding data passed between the two as if he was not present. In doing so, the attacker is able to eaves drop on communication between the two endpoints.
In the case of encrypted communications, the attacker will establish a secure connection with each end point, acting as the other to each side. It is important to understand that two different encrypted communication legs are established during this attack. Both sides believe they have negotiated encrypted communications with the other, when in fact they are negotiated to the attacker. The attacker decrypts received information by one side, eavesdrops, re-encrypts the data, forwards it to the other side and the end points are none the wiser.
Pryvate™ uses a Short Authentication String (SAS) to verify and confirm encryption key integrity as well as the user on the other side. They are the 2 randomly generated words you see on your screen when you call another Pryvate™ subscriber for the first time.
Yes, is the short answer. To understand the answer, you must understand Bluetooth hacking. Then you choose whether or not to use Bluetooth or when and when not to use it. Note. If you are being specifically targeted, then the attacker has to be within 10 meters of you. Bear this in mind when driving.
On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.
On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.
Yes. Your device will work as normal.
Bluetooth hackers set up specialized hardware and software that searches for vulnerable devices with an active Bluetooth connection.
This usually happens in busy areas where commuters or consumers congregate. Your device, if hacked, will give no warning or indication that someone has accessed the information. All hacking must take place within 10 metres of the device being hacked; once the device is out of range, the connection is lost.
Bluetooth hacking comes in two main varieties: “bluesnarfing” and “bluebugging”.
Bluesnarfing is when hackers connect to your device via Bluetooth and access the information on it. Many hackers quickly download the data so that they still have it even if the device goes out of range.
Bluebugging allows hackers to make calls, send text messages and access the internet via the connection, in addition to accessing the personal information on your phone.
Bluetooth hackers can use your phone’s Bluetooth connection to make phone-based payments or call pay-per-minute numbers.
These charges appear on your phone bill at the end of the month.
Even if the phone is not used to steal your money, hackers can download your texts, photos and other vital files. This identifying information can be used for blackmail or for identity theft.
The best protection against Bluetooth hacking is to turn off Bluetooth when you are not using it, especially in busy areas where hackers may search for devices.
If you must leave Bluetooth on, make sure the device is not set as ‘discoverable’; many phones only allow the device to be discoverable for a brief period of time.
Do not initiate new pairing requests in busy areas. Never accept pairing requests that come up at random.
No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.
No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.
One user per subscription. However, you can install your app on multiple devices but only one device can be used at any given time. On multiple devices Pryvate™ must only be running on one device otherwise you will encounter problems.
No. Pryvate is in addition to your current service. Your phone number is simply secured. If someone else dials your number from a Pryvate app then your Pryvate app will answer. Likewise, if you dial someone with pryvate from your Pryvate app then it’s a secure call.
Once your service is active you will see the green telephone symbol at the top of your device and also you can open your app. Once you open the app you will see the main dialler screen. If you know the Pryvate™ subscriber’s number to be dialled then simply dial it and click the telephone button to make the call. Simply dial as an international entry. For example, in the UK it is +447888 123456 and the US it would be +1XXXXX XXXXXX etc. If it is to a former trusted Pryvate number, and it is in your contacts list, then select the name and press the call button. . Note when you are subscribed your number is secured through the app. Your secure number is your normal number – you just need to let users know you are Pryvate™.
No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.
No. The Pryvacy app is peer-to-peer only.
No. Voicemail is a security weakness in any communications system. However the app will register missed calls in the call history.
Simply press the microphone icon. Mute/Unmute
As you are not competing with anyone for contention you will find the video quality of Pryvate™ as good as a television picture. Its real time with virtually no lag unlike Skype who has many users going through the same server. Your secure video is peer to peer.
No. Pryvate is in addition to your current service. Your phone number is simply secured. If someone else dials your number from a Pryvate app then your Pryvate app will answer. Likewise, if you dial someone with pryvate from your Pryvate app then it’s a secure call.
As with a voice call - select the appropriate icon.
You cannot. The cameras are fixed in the application.
Once you initiate a normal voice call you can then initiate a conference call. When the call is active look at the bottom left and see the ‘Add’ button .This allows you to add a caller or transfer the caller to another Pryvate connection.
Before you can securely IM someone you need a trusted relationship with that persons’ number. To do this simply make a call as normal. Once trusted you can IM as and when you wish. They can receive and send if they are connected to the internet. No different to using SMS on a mobile phone. Once the mobile number is trusted then simply follow the following instructions. Open the app and select the chat icon Once pressed you can then select your contact from your trusted numbers. Then message as you would do with any other IM application. You then see the contact selected. Press the chat icon and go.
When you open your Pryvate app, the ‘email’ button will be in the middle of the home screen. Press this to open the secure email screen. Enter email address you registered with along with password. Your password would have been mailed to your Registered Email Address. If you forgot your password click “Forgot Password” to recover. You will then be prompted for your 4-digit Security PIN.
You first need to login with the email address you registered at secure email signup. Then you login, and send the email as normal. The app will take care of the security and encryption of your messages.
Yes. The email is sent via your regular email service so you do not have to change your current email address. However, the email sits in your regular email service, but in encrypted format and can only be read when open on your device since only your device has the private security keys to decrypt the message. Hence your email is still secure.
Automatic discovery of your contacts that are on Pryvate™ app, auto notification when contacts become a Pryvate™ user, auto population of Pryvate™ address book, Enables Pryvate™ users to see when their connected contacts are available for a fully secure call or video call.
Ensures the content of an IM chat can be securely deleted from both users’ devices and is irretrievable by anyone.
Detects when a screenshot is taken in the Pryvate™ app, and warns the sender that their recipient is attempting to photograph their confidential information. This can also indicate that the recipient’s mobile device has been stolen or is being used for criminal content or simply that recipient wishes to keep a copy of the Chat.
Enables secure email to be sent from any platform to any platform, such as Android to iOS and vice versa, and on any email client of the user’s choice. This ensures users do not need to be retrained on new platforms and IT staff can keep their existing procedures in place without having to back up.