Find answers to our commonly asked questions
Criptyque Limited offers the Pryvate™ application, an ever-evolving communications security solution that is delivered as a downloadable app in online stores.
Once you are a part of the Pryvate community you will benefit from real communications security. Initially, across all your voice calls, conference calls, video calls and IMs, along with file transfers such as pictures.
These are our initial offerings, with many more soon to be released to secure your email accounts and internet browsing, to name but two.
Yes. Pryvate uses device-to-device encryption technology, meaning only Pryvate™ app users exchange keys for each peer-to-peer call. The keys are not held on a server. Pryvate uses the ZRTP protocol to encrypt the data packets of the phone call across the internet. The system uses our secure Pryvate network servers to facilitate the calling service and provide complete security.
You can download the Pryvate white paper on ZRTP to understand the technology used for our encrypted voice, video and conference calling.
Currently if you have a device running iOS version 6.0 or Android version 2.2 then you can use Pryvate. Other platforms will come online shortly. (Windows, Blackberry, Symbian etc)
To understand fully a ‘man in the middle attack’ please click here.
A MiTM attack is when an eavesdropper sits between two communicating end points, intercepting and forwarding data passed between them as if they were not present. In doing so, the attacker is able to log all communication between two communicants.
In the case of encrypted communications, the attacker will establish a secure connection with each end point, acting as the other to each side. It is important to understand that two different encrypted communication legs are established during this attack. Both sides believe they have negotiated encrypted communications with the other, when in fact they have negotiated them with the attacker. So, the attacker receives and decrypts information from one side, then re-encrypts it ready to be forwarded to the other.
This cannot happen with a Pryvate call. Pryvate uses a short authentication string (SAS) to verify and confirm encryption key integrity, as well as the identity of the user on the other side (they are the two randomly generated words you see on your screen when you call another Pryvate subscriber for the first time).
If your device is running Android 2.2 or higher then go to Google Play and search for the Pryvate app. If not obvious, then search for Criptyque. Download and then use the ‘get started’ button on the www.pryvatenow.com main page.
Apple IOS 6.0 or later
Search for Pryvate in the Apple App Store and download. Use the ‘get started’ button as above.
If your device is running Android 2.2 or higher then go into Google Play and search for Pryvate™ app. If not obvious then search for Criptyque. Download and then use the get started button on the www.pryvatenow.com main page.
Apple IOS 6.0 or later
Search for Pryvate in the Apps store and download. Use the get started button as above.
On Android you need to use ‘Play Store’. Open the store and you will see the main apps screen.
Click the three lines top left and you will see your options screen. Select My Apps.
Scroll down until you see Pryvate. Select it and you will two options. One is to uninstall.
Select uninstall and Pryvate is gone. To reinstall, download it from Play Store and use your original installation instructions.
Requires iOS 6.0 or later. Compatible with iPhone, iPad, and iPod touch. This app is optimized for iPhone 5.
Any Android device running Android 2.2 or later. Smartphones and tablets.
Yes. Your device will work as normal.
Bluetooth hackers set up specialized hardware and software that searches for vulnerable devices with an active Bluetooth connection. This usually happens in busy areas where commuters or consumers congregate. Your device, if hacked, will give no warning or indication that someone has attacked it. All hacking must take place within 10 metres of the device being hacked; once the device is out of range, the connection is lost.
Bluetooth hacking comes in two main varieties: “bluesnarfing” and “bluebugging”. Bluesnarfing is when hackers connect to your device via Bluetooth and access the information on it. Many hackers quickly download the data they want so that they still have it even if the device goes out of range. Bluebugging allows hackers to make calls, send text messages and access the internet via the connection, in addition to accessing the personal information.
Bluetooth hackers can use your phone’s Bluetooth connection to make phone-based payments or call pay-per-minute numbers. These charges appear on your phone bill at the end of the month. Even if the phone is not used to steal your money, hackers can download your texts, photos and other sensitive files. This identifying information can be used for blackmail or for identity theft.
The best protection against Bluetooth hacking is to turn off Bluetooth when you are not using it, especially in busy areas. If you must leave Bluetooth on, make sure the device is not set as ‘discoverable’; many phones only allow the device to be discoverable for a brief period of time. Do not initiate new pairing requests in busy areas. Never accept pairing requests that come up at random.
No. You would use your phone as normal for this, as the mobile phone is designed to use the strongest available network irrespective of the carrier you are subscribed to.
to the microphone or cameras that can side-step your encrypted applications?
You cannot. Spyware is the only way to defeat this level of encryption, and most spyware is undetectable. The best way to avoid it is not to install any free games or apps.
The quality of the voice or video will not be affected by the levels of bandwidth used on 3G, 4G or Wi-Fi. If you suspect you have low bandwidth you can always run a speed test to see which gives you the better option. We like to use Speedtest at www.speedtest.net. One point to note: when travelling, roaming charges will apply to mobile data.
Yes. As long as you have an internet connection you can use Pryvate as normal. Although there are no charges for using Pryvate you may encounter roaming charges from your service provider if using 3G or 4G. Pryvate can even be used in countries with deep packet inspection servers – those are the ones that block certain apps from making an internet connection.
Yes. To understand why, you have to grasp how Bluetooth hacking works, then you can choose whether or not to use Bluetooth in a given situation. Note. If you are being specifically targeted then the attacker has to be within 10 metres of you. Bear this in mind when driving…
No. Accounts will only ever be terminated for non payment. As long as the account is paid up to date, Pryvate is there for you to use whenever you need to.
For IOS devices download from the Apple App Store store; for Android devices, download from the Google Play Store. Once it is on your device then subscribe to the service. Click the ‘GET PRYVATE™ Pro NOW ‘ button on the home page.
You will then be sent your activation instructions.
One user per subscription. However, you can install your app on multiple devices although you can only use one of them at once, otherwise you will encounter problems.
On the bottom of the screen you will see a pause icon Simply press it. The person on the other end will hear music. You will see a play icon. To take the caller off hold simply press the play icon.
Once your service is active you will see the green telephone symbol at the top of your device. You will also find that you can open your app. Once you open it, you will see the main dialler screen.
If you know the Pryvate subscriber’s number that you want to dial then do so, and click the telephone button to make the call. Dial it as an international entry. For example, in the UK you would add 44 before the number and omit the first zero; in the US you add 1, and so on.
If your call is to a trusted Pryvate number, and it is in your contacts list, then select the name and press the call button. . Note when you are subscribed your number is secured through the app. Your secure number is your normal number – you just need to let users know you are Pryvate™.
Activate the bottom menu as per your devices instructions. Example on an Android HTC ONE M8, press the bottom of the screen and swipe upwards. Select as required.
No. The Pryvacy app is peer-to-peer only.
No. Voicemail is a security weakness in any communications system. However the app will register missed calls in the call history.
Simply press the microphone icon. Mute/Unmute
You will find the video quality of Pryvate to be as good as a television picture. It is real time, with virtually no lag (unlike Skype, which has many users going though the same server). Your secure video is peer-to-peer.
Once a voice call is initiated you can then switch to video by pressing the video button.
The switch is immediate
To switch back simply press the camera button again.
As with a voice call.
As with a voice call.
You cannot. The cameras are fixed in the application.
Once you initiate a normal voice call you can then initiate a conference call. When the call is active look at the bottom right and see the ‘Options’ button Press it and you can then choose the ‘transfer’ or ‘add call’ options.
This allows you to add a caller or transfer the caller to another Private connection.
Once you select ‘add call’ you can dial a Pryvate number or add it, if it is in your contacts.
Before you can securely instant message someone you need a trusted relationship with that person’s number. To do this simply make a call as normal. Once ‘trusted’ you can IM as and when you wish, and they can receive and send it if they are connected to the internet. It is no different to texting on a mobile phone.
Once the mobile number is trusted then simply follow the following instructions. Open the app and select the chat icon
Once pressed you can then select your contact from your trusted numbers.
Then message as you would do with any other IM application. You then see the contact selected.
Press the red chat icon and go.
When you open your Pryvate app, the ‘email’ button will be in the middle of the home screen. Press this to open the secure email screen.
You first need to login with the email address you registered at secure email signup. Then you login, and send the email as normal. The app will take care of the security and encryption of your messages.
Unfortunately, you will not be able to send a secure email. When you attempt to do, you will get a prompt to say “Recipient is unregistered, do you want to send message as plain text?” You can then send the email in its unencrypted form.
Yes. The email is always sent through your regular email service, so you do not have to change your current email address. However, the email exists in an encrypted form and can only be read when open on your or your recipients device, since only they have the keys to decrypt them. Hence your email is still secure
“Finally a product I trust. Pryvate™ is just what I was looking for.
I use this app every day and love the freedom…”
– B Hunter, USA