Find answers to our commonly asked questions
Criptyque Limited offers the Pryvate™ application, an ever-evolving communications security solution that is delivered as a downloadable app for ease of use by our customers.
Once you are a part of the Pryvate community you will benefit from real communications security. Initially, across all your voice calls, conference calls, video calls and IMs, along with file transfers such as pictures.
These are our initial offerings, with many more soon to be released to secure your email accounts and internet browsing experiences to name but two.
Yes. Pryvate uses device-to-device encryption technology, meaning only Pryvate™ app users exchange keys for each peer-to-peer call. The keys are not held on a server. Pryvate uses the ZRTP protocol to encrypt the data packets of the phone call across the internet. Pryvate™ uses our secure Pryvate network servers to facilitate the calling service and provide complete security.
You can download the Pryvate white paper on ZRTP to understand the technology used for our encrypted voice, video and conference calling.
Currently if you have a device running iOS version 6.0 or Android version 2.2 then you can use Pryvate. Other platforms will come online shortly. (Windows, Blackberry, Symbian etc)
A MiTM attack is when an attacker sits between two communicating end points, intercepting and forwarding data passed between the two as if he was not present. In doing so, the attacker is able to eaves drop on communication between the two endpoints.
In the case of encrypted communications, the attacker will establish a secure connection with each end point, acting as the other to each side. It is important to understand that two different encrypted communication legs are established during this attack. Both sides believe they have negotiated encrypted communications with the other, when in fact they are negotiated to the attacker. The attacker decrypts received information by one side, eavesdrops, re-encrypts the data, forwards it to the other side and the end points are none the wiser.
Pryvate™ uses a Short Authentication String (SAS) to verify and conﬁrm encryption key integrity as well as the user on the other side. They are the 2 randomly generated words you see on your screen when you call another Pryvate™ subscriber for the ﬁrst time.
If your device is running Android 2.2 or higher then go into Google Play and search for Pryvate™ app. If not obvious then search for Criptyque. Download and then use the get started button on the www.pryvatenow.com main page.
Apple IOS 6.0 or later
Search for Pryvate in the Apps store and download. Use the get started button as above.
On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.
Requires iOS 6.0 or later. Compatible with iPhone, iPad, and iPod touch. This app is optimized for iPhone 5.
Any Android device running Android 2.2 or later. Smartphones and tablets.
Yes. Your device will work as normal.
Bluetooth hackers set up specialized hardware and software that searches for vulnerable devices with an active Bluetooth connection. This usually happens in busy areas where commuters or consumers congregate. Your device, if hacked, will give no warning or indication that someone has accessed the information. All hacking must take place within 10 metres of the device being hacked; once the device is out of range, the connection is lost.
Bluetooth hacking comes in two main varieties: “bluesnarfing” and “bluebugging”. Bluesnarfing is when hackers connect to your device via Bluetooth and access the information on it. Many hackers quickly download the data so that they still have it even if the device goes out of range. Bluebugging allows hackers to make calls, send text messages and access the internet via the connection, in addition to accessing the personal information on your phone.
Bluetooth hackers can use your phone’s Bluetooth connection to make phone-based payments or call pay-per-minute numbers. These charges appear on your phone bill at the end of the month. Even if the phone is not used to steal your money, hackers can download your texts, photos and other vital files. This identifying information can be used for blackmail or for identity theft.
The best protection against Bluetooth hacking is to turn off Bluetooth when you are not using it, especially in busy areas where hackers may search for devices. If you must leave Bluetooth on, make sure the device is not set as ‘discoverable’; many phones only allow the device to be discoverable for a brief period of time. Do not initiate new pairing requests in busy areas. Never accept pairing requests that come up at random.
No. You would use your phone as normal for this, as the mobile phone is designed to utilise the strongest available network to connect irrespective of the carrier you are subscribed to.
To the microphone or cameras that can side-step your encrypted applications?
You cannot. Spyware is the only way to defeat this level of encryption. Most spyware is exactly that. Written to be undetectable. The best way to avoid spyware is not to install any ‘Free’ games or apps. Keep your phone pure to avoid spyware.
The quality of the voice or video will not be affected by the levels of bandwidth used on 3G, 4G or Wi-Fi. If you suspect you have low bandwidth you can always run a speed test to see which gives you the better bandwidth. We like to use ‘Speedtest’ ( www.speedtest.net) . One point to note: when travelling, roaming charges will apply to mobile data.
Yes. As long as you have an internet connection you can use Pryvate as normal. Whilst there are no charges for using Pryvate you may encounter roaming charges from your service provider if using 3G or 4G. Pryvate can even be used in countries with deep packet inspection servers. (Those that block certain apps from Internet connection).
Yes, is the short answer. To understand the answer, you must understand Bluetooth hacking. Then you choose whether or not to use Bluetooth or when and when not to use it. Note. If you are being speciﬁcally targeted, then the attacker has to be within 10 meters of you. Bear this in mind when driving.
No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.
For IOS devices download from the App Store or for Android devices, download from Play Store (Google). Once on your device then subscribe to the service. Click the ‘GET PRYVATE™ Pro NOW ‘ button on the home page.
You will then be sent your activation instructions.
One user per subscription. However, you can install your app on multiple devices but only one device can be used at any given time. On multiple devices Pryvate™ must only be running on one device otherwise you will encounter problems.
On the bottom of the screen you will see a pause icon Simply press it. The person on the other end will hear music. The Pause will change to a play icon. To take the caller off hold simply press the play icon.
Once your service is active you will see the green telephone symbol at the top of your device and also you can open your app. Once you open the app you will see the main dialler screen.
If you know the Pryvate™ subscriber’s number to be dialled then simply dial it and click the telephone button to make the call. Simply dial as an international entry. For example, in the UK it is +447888 123456 and the US it would be +1XXXXX XXXXXX etc.
If it is to a former trusted Pryvate number, and it is in your contacts list, then select the name and press the call button. . Note when you are subscribed your number is secured through the app. Your secure number is your normal number – you just need to let users know you are Pryvate™.
Activate the bottom menu as per your devices instructions. Example on an Android HTC ONE M8, press the bottom of the screen and swipe upwards. Select as required.
No. The Pryvacy app is peer-to-peer only.
No. Voicemail is a security weakness in any communications system. However the app will register missed calls in the call history.
Simply press the microphone icon. Mute/Unmute
As you are not competing with anyone for contention you will ﬁnd the video quality of Pryvate™ as good as a television picture. Its real time with virtually no lag unlike Skype who has many users going through the same server. Your secure video is peer to peer.
Once a voice call is initiated you can then switch to video by pressing the video button.
The switch is immediate
To switch back simply press the camera button again.
As with a voice call.
As with a voice call.
You cannot. The cameras are fixed in the application.
Once you initiate a normal voice call you can then initiate a conference call. When the call is active look at the bottom left and see the ‘Add’ button .This allows you to add a caller or transfer the caller to another Pryvate connection.
Before you can securely IM someone you need a trusted relationship with that persons’ number. To do this simply make a call as normal. Once trusted you can IM as and when you wish. They can receive and send if they are connected to the internet. No diﬀerent to using SMS on a mobile phone.
Once the mobile number is trusted then simply follow the following instructions. Open the app and select the chat icon
Once pressed you can then select your contact from your trusted numbers.
Then message as you would do with any other IM application. You then see the contact selected.
Press the chat icon and go.
When you open your Pryvate app, the ‘email’ button will be in the middle of the home screen. Press this to open the secure email screen. Enter email address you registered with along with password. Your password would have been mailed to your Registered Email Address. If you forgot your password click “Forgot Password” to recover. You will then be prompted for your 4-digit Security PIN.
You first need to login with the email address you registered at secure email signup. Then you login, and send the email as normal. The app will take care of the security and encryption of your messages.
Unfortunately, you will not be able to send a secure email to a recipient who is not on the Pryvate™ secure email service.. When you attempt to do, you will get a prompt to say “Recipient is unregistered, do you want to send message as plain text?” You can then send the email as a regular unencrypted email.
Yes. The email is sent via your regular email service so you do not have to change your current email address. However, the email sits in your regular email service, but in encrypted format and can only be read when open on your device since only your device has the private security keys to decrypt the message. Hence your email is still secure.
Automatic discovery of your contacts that are on Pryvate™ app, auto notification when contacts become a Pryvate™ user, auto population of Pryvate™ address book, Enables Pryvate™ users to see when their connected contacts are available for a fully secure call or video call.
Ensures the content of an IM chat can be securely deleted from both users’ devices and is irretrievable by anyone.
Detects when a screenshot is taken in the Pryvate™ app, and warns the sender that their recipient is attempting to photograph their confidential information. This can also indicate that the recipient’s mobile device has been stolen or is being used for criminal content or simply that recipient wishes to keep a copy of the Chat.
Enables secure email to be sent from any platform to any platform, such as Android to iOS and vice versa, and on any email client of the user’s choice. This ensures users do not need to be retrained on new platforms and IT staff can keep their existing procedures in place without having to back up.
“Finally a product I trust. Pryvate™ is just what I was looking for.
I use this app every day and love the freedom…”
– B Hunter, USA