THE TECHNOLOGY

$5.62$

ZRTP Encryption

Voice calls and instant messages on the Pryvate™ network use a ‘key-agreement protocol’ called ZRTP. This method has the outstanding advantage of allowing subscribers’ handsets to agree an encryption key between themselves, so it is never known to Pryvate (or anyone else). And because a new key is generated for each call or IM session, the people in the call have perfect ‘forward secrecy’ – in other words, if a key is discovered for a previous call or IM session, it doesn’t compromise subsequent ones.

Another remarkable feature of Pryvate is its ‘anti-blocking’ technology. This allows subscribers to operate in countries where voice-over-internet calls and instant messages are blocked by telecoms operators or governments. The system automatically detects attempts to prevent a call and’tunnels’ through the firewall. It even foils attempts to locate the caller when they are browsing the internet by presenting the host with Pryvate’s public address rather than the subscriber’s actual IP address. Read More>>

Technical Features

  • 4096-bit encryption keys never known to third parties (including us)
  • Calls are ‘point-to-point’, so no servers or men-in-the-middle
  • Anti-blocking feature to tunnel through firewalls
  • Operates in regions where VoIP and IM are otherwise impossible
  • New encryption keys generated for every session on every call and every message
  • FREE unlimited VoIP, SMS texts and video.
  • Connection via 3G/4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA & Wi-Fi

Pryvate™ Encrypted Voice Calls (VOIP)

  • Pyvate uses voice over internet, so calls are free. There are no roaming charges or other hidden cost
  • It can operate on all common networks, including 3G/4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA and Wi-Fi.
  • All your calls are encrypted using the most advanced system yet developed
  • Encryption keys are created on your smartphone for each call and discarded thereafter
  • These single-session keys are never stored or known to Pryvate
  • All calls are point-to-point. There are no servers in the middle, so no record is ever kept of a conversation
  • Video – encrypted, unique keys per call
  • Conferencing – encrypted audio (conference runs on device, subscriber initiates the conference by calling the other parties and adding them to the conference)
VOICE CALLS - TECHNICAL INFORMATION

Encrypted voice communications from your smart mobile phone, impossible to intercept, with the following features:

  • Military grade encryption
  • RSA 4096 bit & AES 256 bit Encryption
  • Diffie-Hellman (DH) Key Exchange
  • MD5 & SHA512 Hash for voice integrity
  • Protection Agent detects, alerts and defends against attacks (“Man-in-the-middle”)
  • 100% secure calls
  • The software uses internet connectivity through 3G/4G, UMTS, HSPA, W-CDMA, EDGE, GPRS and Wi-Fi

diagram1

Read More

Pryvate™ Encrypted Video Calls

  • A Video with codecs: VP8 (WebM), H263, H263-1998, MPEG4, theora and H264 (thanks to a plugin based on x264), with resolutions from QCIF(176×144) to SVGA(800×600) provided that network bandwidth and cpu power are sufficient. See further Technical specs below
  • See further Technical Specs Below
Read More

Pryvate™ Encrypted Instant Message (IM)

  • Internet connect via 3G/4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA, & WIFI
  • All your texts are secured, encrypted and completely private affording perfect forward secrecy
  • Encryption keys are automatically created on your Smartphone for that individual text only
  • User sessions are automatically deleted immediately once the session is terminated. There are no records of any conversation
  • User to user only for all PRYVATE communications. No servers in the middle, so no record of any message conversation
ENCRYPTED INSTANT MESSAGING - TECHNICAL INFORMATION

The application operates in standard unencrypted mode for normal conversations. If a secure conversation is required the user activates secure mode which initiates an authentication phase allowing the user to verify the identity of the other party through a pre-arranged password, question/answer combination or manual fingerprint verification. Once authenticated the application generates short lived session based encryption keys providing secure communications and perfect forward security. During secure IM conversations digital signatures are removed and logging disabled ensuring deniability.

Pryvate™ encrypted IM supports the following features:

  • Encryption – combination of AES symmetric-key, Diffie-Hellman, and SHA-1 hash
  • Authentication – mutual authentication of users using a shared secret
  • Deniability – Messages in a conversation do not have digital signatures
  • Perfect Forward Secrecy – Messages are only encrypted with temporary per-message keys
  • Automated trust relationships

Read More

Pryvate™ Encrypted Email

  • Assign one email address as PRYVATE, or use any/all your email addresses as PRYVATE. It works with all email providers
  • Internet connect via 3G, EDGE, GPRS, UMTS, HSPA, W-CDMA, & WIFI
  • All your emails are secure, encrypted and completely private
  • Encryption keys are automatically created on your Smartphone for each individual email
  • Single session only keys
  • Never Stored or known to Pryvate™
ENCRYPTED EMAIL - TECHNICAL INFORMATION

PRYVATE has developed a secure communications platform that has an integrated secure email component. In fact the component mail is not a mail client at all it only contains the protection mechanism as required to make mail safe and secure. No unsecured data will ever leave the device nor will any key material “live on” on the device. By separating these two areas we at PRYVATE have built in a layer of security not even required by proposed BSI standards.

All communication between app and server is fully encrypted, TLS based or RSA4096 protected. Indeed we employ different schemes of encryption on data travelling from the app to the server and from the server to the app. Key material that is encrypted for sending to the server in-device is encrypted using the public key of an RSA4096 key pair. The connection between app and server is hence considered unbreakable at current standards.

The return communication to the app from the server is protected by the AES256 bit key that is send to the server (RSA4096) and as such can only be read by the server, this key (AES) is freshly generated (and never stored) for each communication between server and app. Each communication to and from the server is always taking place over a TLS certificated secured link, it adds to the security and helps avoid man in the middle attacks. This is in accordance with BSI TR-03145.

PRYVATE only uses true and tested public algorithms RSA4096 and AES256 in international implementations with NO backdoors. As is a requirement of BSI TR-03116-4.

All DNS requests are routed through our servers and are compliant with DNSSEC.

As we are not in a position to manage the transport of the message once the message is encrypted and encapsulated in the .pry attachment, it is sent direct to the users current mail Client on their device (hopefully this is a DANE compliant mail transport). As we have no control over the users choice of email Client, we make the data as secure as possible and that is the reason why we have separated key material from data.

We comply with the Datenschutzanforderungen(BDSG) and richlinie BSI TR-03108 which makes our product one of few that will be above the level of security as highlighted in your Sicherheitskonzept TKG- ISO27001

encrypted email by pryvate encryption app

Read More

Pryvate™ Secure File Transfer

Pryvate Secure file storage enables storage of sensitive data on Users device or other location such as Dropbox, One drive,  BOX,  …
After encryption the file is either sent to their own own email account and as such can be archived via the users Company policies however our platform also allows files to be stored without being “sent”. Files can be stored in encrypted format on the device, on CD/DVD or USB storage device. The decryption key is never located on the device/location. So should you lose or have your device stolen the culprit will not be able to read your files.

SECURE FILE STORAGE - TECHNICAL INFORMATION

Where email is usually limited to x MBYTE of sending this feature allows for larger files to be encrypted, theoretically unlimited…

As the same mechanism for encryption and decryption is used , so when using to send/receive email attachments no extra software or handling is required. The key material can’t be compromised as it never resides with the encrypted file.

The file storage component also works when you want to encrypt a BIG file and then have it delivered to a third party by means of CD/DVD/USB storage device, where again privacy, confidentiality and encryption are safeguarded. Again to do so. a user only has to encrypt the file via the app and then store it in the inbox on the app instead of sending it via mail… When recipient has the file on his device he simply clicks the .pry message and the PRYVATE platform will perform it’s magic.

Combine this with disk encryption to have a fully safe and fool proof system of safeguarding privacy and security for confidential or sensitive information. Whether you keep a stock of private images/videos that nobody should know about or whether you carry around the design plans for a nuclear fusion reactor… with this system they are always available for you and kept from prying eyes.

Read More

Pryvate™ Secure File Storage

Pryvate Secure file storage enables storage of sensitive data on Users device or other location such as Dropbox, One drive,  BOX,  …
After encryption the file is either sent to their own own email account and as such can be archived via the users Company policies however our platform also allows files to be stored without being “sent”. Files can be stored in encrypted format on the device, on CD/DVD or USB storage device. The decryption key is never located on the device/location. So should you lose or have your device stolen the culprit will not be able to read your files.

SECURE FILE STORAGE - TECHNICAL INFORMATION

Where email is usually limited to x MBYTE of sending this feature allows for larger files to be encrypted, theoretically unlimited…

As the same mechanism for encryption and decryption is used , so when using to send/receive email attachments no extra software or handling is required. The key material can’t be compromised as it never resides with the encrypted file.

The file storage component also works when you want to encrypt a BIG file and then have it delivered to a third party by means of CD/DVD/USB storage device, where again privacy, confidentiality and encryption are safeguarded. Again to do so. a user only has to encrypt the file via the app and then store it in the inbox on the app instead of sending it via mail… When recipient has the file on his device he simply clicks the .pry message and the PRYVATE platform will perform it’s magic.

Combine this with disk encryption to have a fully safe and fool proof system of safeguarding privacy and security for confidential or sensitive information. Whether you keep a stock of private images/videos that nobody should know about or whether you carry around the design plans for a nuclear fusion reactor… with this system they are always available for you and kept from prying eyes.

Read More

Pin Encrypted Mobile Protection

Pryvate Secure file storage enables storage of sensitive data on Users device or other location such as Dropbox, One drive,  BOX,  …
After encryption the file is either sent to their own own email account and as such can be archived via the users Company policies however our platform also allows files to be stored without being “sent”. Files can be stored in encrypted format on the device, on CD/DVD or USB storage device. The decryption key is never located on the device/location. So should you lose or have your device stolen the culprit will not be able to read your files.

SECURE FILE STORAGE - TECHNICAL INFORMATION

Where email is usually limited to x MBYTE of sending this feature allows for larger files to be encrypted, theoretically unlimited…

As the same mechanism for encryption and decryption is used , so when using to send/receive email attachments no extra software or handling is required. The key material can’t be compromised as it never resides with the encrypted file.

The file storage component also works when you want to encrypt a BIG file and then have it delivered to a third party by means of CD/DVD/USB storage device, where again privacy, confidentiality and encryption are safeguarded. Again to do so. a user only has to encrypt the file via the app and then store it in the inbox on the app instead of sending it via mail… When recipient has the file on his device he simply clicks the .pry message and the PRYVATE platform will perform it’s magic.

Combine this with disk encryption to have a fully safe and fool proof system of safeguarding privacy and security for confidential or sensitive information. Whether you keep a stock of private images/videos that nobody should know about or whether you carry around the design plans for a nuclear fusion reactor… with this system they are always available for you and kept from prying eyes.

Read More

Multiple Account Management

Pryvate Secure file storage enables storage of sensitive data on Users device or other location such as Dropbox, One drive,  BOX,  …
After encryption the file is either sent to their own own email account and as such can be archived via the users Company policies however our platform also allows files to be stored without being “sent”. Files can be stored in encrypted format on the device, on CD/DVD or USB storage device. The decryption key is never located on the device/location. So should you lose or have your device stolen the culprit will not be able to read your files.

SECURE FILE STORAGE - TECHNICAL INFORMATION

Where email is usually limited to x MBYTE of sending this feature allows for larger files to be encrypted, theoretically unlimited…

As the same mechanism for encryption and decryption is used , so when using to send/receive email attachments no extra software or handling is required. The key material can’t be compromised as it never resides with the encrypted file.

The file storage component also works when you want to encrypt a BIG file and then have it delivered to a third party by means of CD/DVD/USB storage device, where again privacy, confidentiality and encryption are safeguarded. Again to do so. a user only has to encrypt the file via the app and then store it in the inbox on the app instead of sending it via mail… When recipient has the file on his device he simply clicks the .pry message and the PRYVATE platform will perform it’s magic.

Combine this with disk encryption to have a fully safe and fool proof system of safeguarding privacy and security for confidential or sensitive information. Whether you keep a stock of private images/videos that nobody should know about or whether you carry around the design plans for a nuclear fusion reactor… with this system they are always available for you and kept from prying eyes.

Read More

Pryvate™ Encrypted Web Browsing (Coming soon)

  • Secure web browsing for you, your family and the people you work with
  • Confidence in online banking and when sharing other personal information
  • PRYVATE has created a web browser to ensure your privacy with end to end implementation of anti-traffic analysis measures
  • From the basic Proxy service thru to surfing on our in house network with full HD video
  • PRYVATE has developed a security centric proprietary browser that automatically disguises your actual IP Address which can be tracked back by criminals to locate your residential address
  • Basic subscription includes up to 256 kb only
ENCRYPTED WEB BROWSING - TECHNICAL INFORMATION

The PRYVATE anonymous web browsing capability offers a number of features to the end user:

  • Anti-traffic analysis measures
  • Random pathways through several internet relays to obscure your location
  • No individual relay ever knows the complete path that a data packet has taken
  • A compromised relay cannot use traffic analysis to link the connection’s source and destination

diagram4

Read More

Pryvate Key Technical Data

ZRTP encryption for both Voice and IM. The subscriber’s handsets negotiate the encryption keys between themselves so the key is never known to PRYVATE. A new key is generated for each call or IM session enforcing perfect forward secrecy. This means if an encryption key is discovered for a previous call or IM session any subsequent communications are not compromised.

The subscriber’s private email key is stored on the device and protected by a personal password which is never divulged to PRYVATE.

Anti-blocking technology that allows subscribers to operate in regions where VoIP calls and IM are blocked by the operators or governments. The system automatically detects these situations and tunnels the communications over the PRYVATE network.

Browsing via the PRYVATE network presents the host with our public IP address so the remote host does not detect the subscriber’s actual IP address preventing the host from determining the subscriber’s location.

Read More

Backend Services

This default method of key management ensures privacy for our subscribers as neither PRYVATE or any associated parties have any access to the end user’s private keys. This prevents PRYVATE or any associated party from being a target for any information related to the user’s private keys, thus ensuring privacy. The voice and IM keys are generated per session by the PRYVATE application on the user’s device, and are discarded at the end of the session. The email application private keys are held on the device.

Read More

Pryvate Anti-Blocking

Pryvate™ has developed a VoIP anti blocking solution for our users who wish to bypass illegitimate firewall restrictions on 3G networks.

Its principle is tunneling all SIP and RTP traffic through a single secure https connection up to a detunnelizer server. Our solution comprises:

  • A tunnel client library to be integrated into the Pryvate client for iPhone or Android.
  • A tunnel server is deployed inside our network infrastructure. The tunnel server re-creates the SIP and RTP traffic from the data of each secure connection to the clients.
Read More

Pryvate Key Management

The front end applications will be supported by a backend registration service for voice and instant messaging, user presence and availability information. Key servers will be established for the email application storing and synchronizing keys within the PRYVATE / CRIPTYQUE Ltd network.

The anonymous browsing is achieved through a network of globally distributed servers that randomly route traffic through the network between the user device and the destination internet site, anonymising the source address on each hop.

The backend services are supplied by CRIPTYQUE Ltd Limited’s server pools which will initially be a single site service that will be expanded to a globally distributed service. The global service rollout will have no impact on the customer experience as the distribution of traffic to the various geographical services will be handled through DNS and will require no changes to the applications.

Initially the DNS services will be supplied through a third party, but an internal DNS service will be set up before switching all device traffic to the PRYVATE / CRIPTYQUE Ltd network. The decision to switch will be based upon the number of customers, the types of service in use and the cost and maintenance of a global server network to service the customer base.

Read More

It’s No Secret, We Deserve PRIVACY!

“Finally a product I trust. Pryvate™ is just what I was looking for.
I use this app every day and love the freedom…”

– B Hunter, USA

Translate »