An end-to end security solution,not just another downloadable “secure” software application.
Individual software applications cannot isolate themselves from other installed software applications, the operating system the device relies on, or the network they connect to. The integrity of the solution is paramount. This includes securing the hardware, operating system, software applications, data transit, network infrastructure and servers. Ignoring any facet of this is devastating and renders the actual security of the product to the level of marketing hype.
At power on Our Technology data, whether at rest or in transit, is always fully encrypted. All clients directly negotiate keys automatically with each other’s devices. Our servers, located offshore in our datacenter, never create, store, or decrypt keys, message conversations or user data.
Quad-band GSM, UMTS and CDMA all supported. Unlimited international SIM included +120 countries.
No way to associate device or SIM card to customer account.
Customized Android Platform
Fully encrypted from power on. Focus on security and privacy. Simplified user settings.
Industry Leading Hardware
Specially tailored to harden security. Camera, microphone, GPS are completely safe.
Dual Operating System (OS)
Subscribers can now launch either a standard Android OS or the Encripted OS. Two distinctive Operating Systems packaged with each device.
Attack surfaces such as ADB connectivity and recovery mode have been removed.
Encripted Messaging Protocol
The electronic equivalent of a regular conversation between two people in an empty room.
Messages that Self-Destruct
With our advanced burn a user can force wipe their own messages from another user’s device using a timer countdown.
Upon boot, the device internally checks itself to ensure no one has tampered with the system files.
From screen lock a user can type in a PIN and instantly wipe device’s data.
Over-the-Air (OTA) Service
Enhancements, patches, and features can be securely added directly to the Android Operating system of a subscriber device.
After a set amount of password attempts on device all data is wiped.
Updates & Live Support
Frequent application updates direct. Includes live support.
Using our Notary verification process vastly simplifies the complexities of encryption for end users.
Field Factory Restore
A user can now securely wipe subscriber device and rebuild it in the field.
Hardware Cryptographic Engine (FIPS 140-2 certified)
An Encripted device can not be brute forced to mount the encrypted data partition. We generate an RSA public/private keypair with which the public key portion is combined with your disk encryption passphrase.
Our flagship product. It is a user-friendly secure instant messaging client designed for mobile environments. Security is guaranteed using our Encripted Chat Messaging Protocol. This is an end-to-end encryption messaging protocol which provides excellent forward and future secrecy properties for symmetric-key updating, along with improved deniability guarantees over the OTR protocol and its variants. We have also vastly simplified user verification to remove the complexities of encryption for end users.
Send and receive encrypted images from point to point without compromising your security.
Gives users information about their SIM card, notifications about renewals, remaining subscription time and VOIP time.
Encrypts all Voice over IP (VoIP) conversations using the ZRTP protocol and transmits them over a closed loop network. A subscriber can send an invite request to another user on our network and, if accepted, can contact them almost anywhere an Encripted talk user resides. We currently have users speaking globally to one another in countries like Australia or China talking securely and crystal clear to subscribers in Canada or South America.
You can safely encrypt your notes which are stored locally on your device in an encrypted database with its own passphrase contained within an encrypted partition. It is optional to backup your notes and contacts to our Encripted secure data center. To restore your EncroNotes, we use two factor authentication – the IMEI of your device and your EncroNotes passphrase.
Users can send messages about any support issues or questions through a separate communciations path.