Pryvate™ FAQ



images


What is Pryvate™?

Criptyque Limited offers the Pryvate™ application, an ever-evolving communications security solution that is delivered as a downloadable app for ease of use by our customers.
Once you are a part of the Pryvate community you will benefit from real communications security. Initially, across all your voice calls, conference calls, video calls and IMs, along with file transfers such as pictures.
These are our initial offerings, with many more soon to be released to secure your email accounts and internet browsing experiences to name but two.


Is Pryvate™ Secure?

Yes. Pryvate uses device-to-device encryption technology, meaning only Pryvate™ app users exchange keys for each peer-to-peer call. The keys are not held on a server. Pryvate uses the ZRTP protocol to encrypt the data packets of the phone call across the internet. Pryvate™ uses our secure Pryvate network servers to facilitate the calling service and provide complete security.
You can download the Pryvate white paper on ZRTP to understand the technology used for our encrypted voice, video and conference calling.


Can I use Pryvate™ on my Device?

Currently if you have a device running iOS version 6.0 or Android version 2.2 then you can use Pryvate. Other platforms will come online shortly. (Windows, Blackberry, Symbian etc)


What is a Man in the Middle attack (MiTM)?

A MiTM attack is when an attacker sits between two communicating end points, intercepting and forwarding data passed between the two as if he was not present. In doing so, the attacker is able to eaves drop on communication between the two endpoints.
In the case of encrypted communications, the attacker will establish a secure connection with each end point, acting as the other to each side. It is important to understand that two different encrypted communication legs are established during this attack. Both sides believe they have negotiated encrypted communications with the other, when in fact they are negotiated to the attacker. The attacker decrypts received information by one side, eavesdrops, re-encrypts the data, forwards it to the other side and the end points are none the wiser.
Pryvate™ uses a Short Authentication String (SAS) to verify and confirm encryption key integrity as well as the user on the other side. They are the 2 randomly generated words you see on your screen when you call another Pryvate™ subscriber for the first time.


Are my communications compromised if I use a Bluetooth wireless headset?

Yes, is the short answer. To understand the answer, you must understand Bluetooth hacking. Then you choose whether or not to use Bluetooth or when and when not to use it. Note. If you are being specifically targeted, then the attacker has to be within 10 meters of you. Bear this in mind when driving.


How do I uninstall and reinstall Pryvate™?

On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.


What devices does Pryvate currently support?

On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.


Does Pryvate support Bluetooth?

Yes. Your device will work as normal.


How Bluetooth Hacking Works

Bluetooth hackers set up specialized hardware and software that searches for vulnerable devices with an active Bluetooth connection.
This usually happens in busy areas where commuters or consumers congregate. Your device, if hacked, will give no warning or indication that someone has accessed the information. All hacking must take place within 10 metres of the device being hacked; once the device is out of range, the connection is lost.


Types of Bluetooth Hacking

Bluetooth hacking comes in two main varieties: “bluesnarfing” and “bluebugging”.
Bluesnarfing is when hackers connect to your device via Bluetooth and access the information on it. Many hackers quickly download the data so that they still have it even if the device goes out of range.
Bluebugging allows hackers to make calls, send text messages and access the internet via the connection, in addition to accessing the personal information on your phone.


Dangers of Bluetooth Hacking

Bluetooth hackers can use your phone’s Bluetooth connection to make phone-based payments or call pay-per-minute numbers.
These charges appear on your phone bill at the end of the month.
Even if the phone is not used to steal your money, hackers can download your texts, photos and other vital files. This identifying information can be used for blackmail or for identity theft.


Protecting Your Phone

The best protection against Bluetooth hacking is to turn off Bluetooth when you are not using it, especially in busy areas where hackers may search for devices.
If you must leave Bluetooth on, make sure the device is not set as ‘discoverable’; many phones only allow the device to be discoverable for a brief period of time.
Do not initiate new pairing requests in busy areas. Never accept pairing requests that come up at random.

Will my Pryvate™ account ever be terminated owing to non-usage?

No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.

How do I activate Pryvate on my device?

No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.

SHow many users per subscription?

One user per subscription. However, you can install your app on multiple devices but only one device can be used at any given time. On multiple devices Pryvate™ must only be running on one device otherwise you will encounter problems.

Will I lose my regular phone number when I subscribe to Pryvate?

No. Pryvate is in addition to your current service. Your phone number is simply secured. If someone else dials your number from a Pryvate app then your Pryvate app will answer. Likewise, if you dial someone with pryvate from your Pryvate app then it’s a secure call.

How do I put a voice call on hold?

How do I make a phone call?

Once your service is active you will see the green telephone symbol at the top of your device and also you can open your app. Once you open the app you will see the main dialler screen. If you know the Pryvate™ subscriber’s number to be dialled then simply dial it and click the telephone button to make the call. Simply dial as an international entry. For example, in the UK it is +447888 123456 and the US it would be +1XXXXX XXXXXX etc. If it is to a former trusted Pryvate number, and it is in your contacts list, then select the name and press the call button. . Note when you are subscribed your number is secured through the app. Your secure number is your normal number – you just need to let users know you are Pryvate™.

How do I bring up the keypad during a call?

No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.

Can I dial non-subscriber numbers?

No. The Pryvacy app is peer-to-peer only.

Does Pryvate™ have voicemail?

No. Voicemail is a security weakness in any communications system. However the app will register missed calls in the call history.

How do I mute the audio during a call?

Simply press the microphone icon. Mute/Unmute

How good is the video quality?

As you are not competing with anyone for contention you will find the video quality of Pryvate™ as good as a television picture. Its real time with virtually no lag unlike Skype who has many users going through the same server. Your secure video is peer to peer.

How do I initiate a video call?

No. Pryvate is in addition to your current service. Your phone number is simply secured. If someone else dials your number from a Pryvate app then your Pryvate app will answer. Likewise, if you dial someone with pryvate from your Pryvate app then it’s a secure call.

How do I mute the microphone during a video call?

How do I access the menu during a video call?

As with a voice call - select the appropriate icon.

How do I switch between cameras during a video call?

You cannot. The cameras are fixed in the application.

How do I initiate a conference call?

Once you initiate a normal voice call you can then initiate a conference call. When the call is active look at the bottom left and see the ‘Add’ button .This allows you to add a caller or transfer the caller to another Pryvate connection.

How do I initiate a Secure IM?

Before you can securely IM someone you need a trusted relationship with that persons’ number. To do this simply make a call as normal. Once trusted you can IM as and when you wish. They can receive and send if they are connected to the internet. No different to using SMS on a mobile phone. Once the mobile number is trusted then simply follow the following instructions. Open the app and select the chat icon Once pressed you can then select your contact from your trusted numbers. Then message as you would do with any other IM application. You then see the contact selected. Press the chat icon and go.

How do I access my secure email?

When you open your Pryvate app, the ‘email’ button will be in the middle of the home screen. Press this to open the secure email screen. Enter email address you registered with along with password. Your password would have been mailed to your Registered Email Address. If you forgot your password click “Forgot Password” to recover. You will then be prompted for your 4-digit Security PIN.

How do I send a secure email?

You first need to login with the email address you registered at secure email signup. Then you login, and send the email as normal. The app will take care of the security and encryption of your messages.

What if the person I am emailing is not on the Pryvate secure email service?

Why are my secure emails composed in the app, but get sent out using my regular email client? Is this secure?

Yes. The email is sent via your regular email service so you do not have to change your current email address. However, the email sits in your regular email service, but in encrypted format and can only be read when open on your device since only your device has the private security keys to decrypt the message. Hence your email is still secure.

Presence

Automatic discovery of your contacts that are on Pryvate™ app, auto notification when contacts become a Pryvate™ user, auto population of Pryvate™ address book, Enables Pryvate™ users to see when their connected contacts are available for a fully secure call or video call.

Self-destruct on IM

Ensures the content of an IM chat can be securely deleted from both users’ devices and is irretrievable by anyone.

Notifications on screenshots

Detects when a screenshot is taken in the Pryvate™ app, and warns the sender that their recipient is attempting to photograph their confidential information. This can also indicate that the recipient’s mobile device has been stolen or is being used for criminal content or simply that recipient wishes to keep a copy of the Chat.

Agnostic secure email

Enables secure email to be sent from any platform to any platform, such as Android to iOS and vice versa, and on any email client of the user’s choice. This ensures users do not need to be retrained on new platforms and IT staff can keep their existing procedures in place without having to back up.