Encrochatsure.Com
Total Page:16
File Type:pdf, Size:1020Kb
EncroChatSure.com . Better Sure than sorry! EncroChat® Reference & Features Guide EncroChatSure.com 1 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® - Feature List 2 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® - The Basics Question: What are the problems associated with disposable phones which look like a cheap and perfect solution because of a number of free Instant Messaging (IM) apps with built-in encryption? Answer: Let us point to the Shamir Law which states that the Crypto is not penetrated, but bypassed. At present, the applications available on play store and Apple App store for Instant Messaging (IM) crypto are decent if speaking cryptographically. The problem with these applications is that they run on a network platform which is quite vulnerable. The applications builders usually compromise on the security issues in order to make their application popular. All these applications are software solutions and the software’s usually work with other software’s. For instance, if one installs these applications then the installed software interfere with the hardware system, the network connected to and the operating system of the device. In order to protect the privacy of the individual, it is important to come up with a complete solution rather than a part solution. Generally, the IM applications security implementations are very devastating for the end user because the user usually ignores the surface attacks of the system and the security flaws. When the user looks in the account, they usually find that the product is nothing but a security flaw. Individuals need to remove all things in order to determine the actual expectation from the product. For instance, the hardware like GPS and microphones should be removed. Web browsers, internet explorer, blue tooth capabilities, and SMS platform usually affect the privacy and facilitate Trojans and malware in the device. Antivirus software could however be used to resist the attacks from the malware and protect the system and operating system both. Additional measures to protect the device include using encryption; USB debugging and using secure data wipe capabilities. The verification of the user is the most neglected area in the most of the application; however, it is a very important component in communication security. Through verification, it becomes easier to determine whom one is talking to and the chances of attacks become almost negligible. Additionally, this way the attacks severity also reduces manifold. Furthermore, the individuals who promote these products should also be trustworthy. In simple words, if the promoter is trustworthy, the likelihood that the application will be trustworthy becomes high automatically. Do you feel that your interests in privacy are being served when ex-Navy seals (hello, Silent Circle) or the former CEO of IN-Q-TEL an investment arm of CIA (hello, Wickr), and other prominent former members of US government have managed to secure seats on these corporate boards with large investments? Good cryptography is only a part of the security system and not just the whole game. 3 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® Messaging Protocol vs Off-The-Record Messaging Protocol OTR Version 3.0 The term OTR stands for ‘’Off the Record Messaging’’. It is nothing but a protocol for cryptography that is used for encrypting instant messages. It comprises of AES symmetric key algorithm, SHA-1 has function and the Diffie Hellman key exchange. Key Exchange: Diffie-Hellman Group 5 (1536 bit key) Through this method, both parties share a key through the channel of communication. These parties have no knowledge about each other. The key is used for encryptions. The key idea is here is that Bob and Alice indulge in key exchange and then the authentication is done in the communication channel. Cipher: AES 128 cipher in CTR mode symmetrical key cipher Public Key: DSA 1024 This is the usual key for authentication only and not for encryption purpose. MAC: SHA-1: The message is authenticated via code which ensures integrity of the message. Verification: This is done manually or via Socialist Millionaires' Protocol (SMP) EncroChat® Messaging Protocol This protocol provides end to end encryption to users. It includes forward and future secrecy properties. It also has deniability guarantees. Through this protocol, we ensure that the end user does not face problems related to encryption. Key Exchange: Elliptical Curve Diffie-Hellman Ephemeral (ECDHE) 25519 (http://safecurves.cr.yp.to/) Cipher: AES 256 cipher in CTR mode MAC: HMAC-SHA256 Verification: Performed manually or through Notaries 4 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® - Welcome to the Evolution of Data Privacy The term PGP stands for the ‘’Pretty Good Privacy’’. This is nothing but an encryption tool used for decades in order to protect data. The tool like its name is actually pretty good. However, there are certain drawbacks of the tool as well. One key / Non-Reputability: For instance, is an encryption key but the limitation is that each user can have one key only. It becomes more problematic if the private key is hacked or exposed, then the attacker can retrieve all messages using that key. Hence, this is a huge limitation. In addition to that, the sender identity and ownership can be checked through the sent message because each message is signed with the user private key. The receiver holds the responsibility for the sender privacy. The receiver usually denies any conversation with the sender when they are having a private conversation so that both remain safe and sound. It is the requirement of the system that the user should have one public key in order to communicate privately so that they remain safe. Through this public key, both parties can authenticate each other. In addition to that, this key is of no importance if two people are discussing encryption protocol like PGP. As per the developer view at EncroChat, the problem of encryption is in implementation and not in the development phase. As per the Shamir Law, the attacker simply bypasses the cryptography. Additionally, the hackers of the modern day software usually penetrate the system through the cryptanalysis. However, there are other simpler ways to attack and break the system as well. Why users should use EncroChat®? The best thing EncroChat® is that it is equipped with all the security measures. It does not protect partial security rather it is an end to end security system. Being a software system, this software interacts with the other software applications, the network of the system and the operating system. The system is very much useful and the developers ensured that the system integrity is the primary responsibility. For this purpose, the developers ensured that the software is capable of securing the hardware, the operating system, the software applications, the data transit, and the servers. The developers also know that they must secure these aspects in order to satisfy the customers. The end-to-end encryption security mechanism is the unique selling preposition of the system. 5 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® protects conversations with the following four Tenets: 1. Perfect forward secrecy: a different set of keys is used to encrypt each message session. In addition to that, if there is a repetition of the key then the previous message is not replaced with the new message. 2. Repudiable authentication: there is no digital signature that can be misused by the third party but the party remains assured as to whom they are talking to. Therefore, it works two ways. 3. Deniability: once the conversation is over, it may be possible that the message may be forged by the third party but during conversation, it cannot happen. Everything is done in the real time. 4. Encryption strength: as compared to the algorithms employed by the PGP, the EncroChat® is stronger. Different families of mathematics are used to develop this strong algorithm so that there is no mismanagement and the encryption algorithm remains unsolved. 6 EncroChatSure.com . Better Sure than sorry! EncroChatSure.com . Better Sure than sorry! EncroChat® Features There are different features of EncroChat®. The following are the main features 1. Advanced Off-The-Record (OTR) Protocol: This is equal to the conversation between two individuals. This protocol offered by us is very different and useful as compared to the competitors. We offer future secrecy to the client so that they remain satisfied. 2. Guarantee Anonymity: There is no method to associate any device or sim card to the customer account. 3. Virtual private network: When the data is transferred to offshore data-center, then the user traffic is verified and encrypted to protect the customer data. 4. Customized Android Platform: The data starts to be encrypted once the power is on. The focus is on user privacy. The settings are user friendly. 5. Industry Leading Hardware: The goal of the product is to maintain security. The product is customized in order to improve security. The camera, microphone, and GPS could be removed for better security. 6. Global service: The product is global and more than 120 countries Sims are protected. Additionally, Quad-band GSM, UMTS and CDMA are also supported. 7. Self-destructive message: The user has the option to delete their message from other user device due to our advance burn function. This is done by a timer count down. 8. Panic wipe: The device data can wipe off from a screen lock by typing in the secret PIN. 9. Password wipe: In case the password is entered wrongly several times, all data is wiped off.