It is always best to use open-source, peer-reviewed encryption tools on your smartphone, tablet and desktop computer. The Pryvate app for Android (2.2 or higher) and Apple (iOS 6.0 or later) features voice encryption capabilities that enable subscribers to make free, voice over internet protocol (VoIP) calls that are secure, encrypted and completely private.
Single-session-only keys are never stored or known to Pryvate as the software works on a peer-to-peer basis with no servers in the middle - so no record of calls is ever kept.
We utilize the same encryption whilst conferencing with multiple users – with all voice calls encrypted. The conference call runs on the conference organizer’s device. They initiate the conference by calling the other parties and adding them to the group.
Video encryption takes video data and makes it impossible to view by anyone except the intended recipient – so long as the intended recipient has the correct key to decipher the data and view the video in its intended format. There are two types of video encryption: personal and Digital Rights Management (DRM). Personal encryption refers to someone who wants to share a personal video with clients, family or friends and who does not want anyone unauthorised to see it. DRM is the same thing, although more complex. It can often include:
As with voice calls, a new key is generated every time a connection is made, which further protects the security and integrity of the data. This means that if an encryption key from a previous call was discovered – subsequent calls would not be compromised.
Video codec specifications include:
The application operates in standard unencrypted mode for normal conversations. If a secure conversation is required, the user activates secure mode, which initiates an authentication phase. This allows the user to verify the identity of the other party through a pre-arranged password, question and answer combination or fingerprint. Once authenticated, the application generates short-lived, session-based encryption keys – providing secure communications and perfect forward security. This ensures that the discovery of a past key does not compromise the security of future sessions. During secure IM conversations, digital signatures are removed and logging is disabled to ensure deniability.
An innovative security feature of Pryvate’s service detects when a screenshot is taken from within the Pryvate App. When this happens, the App automatically notifies the sender that the recipient is making a record of confidential information.
The number of potential hackers and government agencies that may be monitoring your online conversations, including your instant messages has never been higher. If you’re using an open wireless connection, there are numerous free software packages that can intercept unencrypted Instant Messaging (IM) communications. Even password protected wireless networks leave you vulnerable to monitoring from your broadband or software providers. It is therefore essential that you consider your online security when it comes to instant messaging – whether you use it for personal or business purposes.
Pryvate IM encryption is a varied implementation of Signal protocol, along with a ZRTP call through an oral SAS verification to provide mutual identity authentication as added MiTM attack protection security.
Pryvate Instant Message Encryption implements the Signal protocol
allowing users to privately and asynchronously exchange messages, also
supports multiple devices per user and multiple users per device.
Pryvate IM encryption establishes encrypted sessions and encrypts
messages but relies on Pryvate to acquire the unique identification
string of peer devices and route the messages to their recipients.
The Signal protocol specification utilises the Double Ratchet Algorithm
the X3DH Key Agreement Protocol and the Sesame Algorithm.
Application containerisation ensures that all received attachments sent
through Pryvate instant messaging are safely kept inside the application
space unless and until they are exported or sent to an external viewer
for any attachments that require an external viewer.
A parameter inside our chat rooms allow users to also automatically
store received photos and videos inside phone Gallery if they so
choose.
Containerisation also applies for sent attachments that are generated
inside the app, meaning photos and videos that are taken within the app
and then sent. Agnostic platform; Android to IOS or vice versa;
adaptable to existing email addresses
Email encryption software is intended to eliminate the risks posed by network eavesdroppers. In general, email communications are passed through the ether using unprotected protocols such as SSL/TSL. The emails are therefore transmitted in plain text across local networks and the internet. As a result, email messages and their attachments can be intercepted and read by those wishing to attack users maliciously or monitor their messages. It is not just potentially sensitive information that is at risk (such as bank details, log-in credentials, and so on). Hackers, who gain access to email messages, can access content from users and their contacts – or even hijack their entire email account.
This not a mail client. It contains only the protection mechanism required to make a user’s emails secure. What it does is assure users that no unsecured data will ever remain or leave the device and that encryption data will be stored separately on Pryvate’s servers. By separating the encryption and the key, we have built in an added layer of security and removed the need for users to input additional SMTP/POP3 settings when setting up their client.
We have built in a layer of security that goes beyond that proposed by the British Standards Institute.
If you are after the peace of mind that your important files will be able to be safely transferred without of the worry of them being intercepted by someone else, Pryvate™ has the ideal solution for you. Pryvate™ secure file transfer will allow you to transfer your private files or data securely using military grade encryption. You will be able to safely transfer your data from your personal device, via email or by utilising file sharing programmes such as Dropbox, One Drive, or BOX securely. Your secure file transfer will be free from prying eyes, competition, hackers and more when you use Pryvate™.
The Pryvate™ platform allows for secure file transfers to be stored
without
being “sent”. Files can be stored in an encrypted format on the device,
on
CD/DVD or USB storage device. The decryption key is never located on the
device or file location. This will ensure that if you should you lose or
have your device stolen; the culprit will not be able to break into your
files. Without the need to ‘send’ files to ensure secure encryption,
secure
file transfers can be made via the Pryvate™ app, resulting in no
limitations
in terms of file size as you would experience with email. The same
method
for encryption is used for decryption and no extra software is required.
The
key material can’t be compromised as it never resides with the encrypted
file.
The file storage component of Pryvate™ also works when you want
to
encrypt a big file and have it delivered to a third party by means of
CD/DVD/USB storage device. The Pryvate™ app will automatically encrypt
your
file and store it in the inbox of the app instead of sending via email.
When
the recipient has the file on their device, they simply click the .pry
message and the app works its magic. File transfers are now made
securely,
privately and protected.
Combine this with disk encryption to have a fully safe and fool-proof
system
of safeguarding privacy and security for confidential or sensitive
information. Whether you keep a stock of private images/videos that
nobody
should know about, or whether you carry around the design plans for a
nuclear fusion reactor… with this system they are always available for
you
and kept from prying eyes.
As part of the secure file transfer process, Pryvate™ secure file storage
can
protect your personal or corporate files utilising secure military grade
encryption. Whether you are storing your files on a device, PC, laptop
or
using a file share programme such as Dropbox or BOX, Pryvate™ will
ensure
that your files are encrypted and safe from any potential hackers,
corporate
espionage or the competition.
Encrypted files are stored without being ‘sent’ as with traditional
email.
The Pryvate™ application allows the encrypted files to be securely
stored on
your device. They can also be stored securely on external devices such
as
CD/DVD’s or USB devices. The decryption key is never located on the
device/location therefore your securely stored files are safe. If your
device should be lost or stolen you can feel confident that your files
cannot be compromised.
Pryvate™ is a user-friendly APP that once installed, will revolutionise
your
communications!
We have taken steps to secure every aspect of the app and added
best-of-breed security to each element. As voice and video share the
same
root, we have treated them equally in our platform and have also added
secure protection for instant messaging.
With our triple layered secure voice component, users experience quality
voice and video communications, incorporating RSA4096 encryption
intermingled with AES and DH key exchange as a MiM flag.
In addition to this, our secure communications platform also has an
integrated encrypted email component. The component mail is not a mail
client at all, as it only contains the protection mechanism required to
make
your email safe and secure. No unsecured data will ever leave the
device,
but encryption data will be stored separately with Pryvate™. By
separating
the two elements, we have built in an added layer of security. This
results
in no need for users to input additional SMTP/POP3 settings when setting
up
their email client.
Additionally, we have an extra layer of security. To protect access to
our
App there is a PIN that acts as an extra activation code – making
eavesdropping impossible.
It is standard practice in most businesses for employees not to be allowed to manage their own email accounts. The installation and activation of all corporate software is invariably handled by security officers, IT staff or line managers. This has the unfortunate consequence that central departments often find it difficult to keep track of the state of their network. So, to enable greater network transparency we have built a management dashboard that allows authorised employees to see:
This results in greater security for an organisation, as well as better
ease
of use for the HR, IT departments and any other authorised personal.
The activation element of the software makes it user-friendly and easy
to
add new employees to the network. At Pryvate, we can import lists of
employees and activate or deactivate accounts or this can be left to an
HR
department (which usually has the most up-to-date records), IT or
security
officers – depending on a user’s corporate policy.
Multiple Account Management is particularly valuable once more than 50
people are using our software – although many clients with fewer staff
still
use it because of its flexibility, transparency and improved security.
Feel confident when sharing personal information or banking online with
Private’s™ proprietary web browser.
Pryvate™ encrypted web browsing offers secure, private web browsing for
you,
your family and the people who work with you through our bespoke web
browser, which has been built with end-to-end implementation of
anti-traffic
analysis measures. Our secure browser will disguise your IP address
which
can often be tracked by criminals to locate your residential address.
From the provision of a basic proxy service, right through to using the
Private™ network with full HD video, you can rest assured that no
individual
relay will ever be able to decipher the complete path that any
particular
data packet has taken. Our secure browser will use random pathways
through
several internet relays to obscure your location and a compromised relay
cannot use traffic analysis to link the connection’s source and
destination.
Pryvate™ uses ZRTP encryption for both Voice and IM. The subscribers’
handsets negotiate the encryption keys between themselves so the key is
never known to us. A new key is generated for each call or IM session,
enforcing perfect forward secrecy. This means that if an encryption key
is
discovered for a previous call or IM session, any subsequent
communications
are not compromised.
For our secure email transfer and storage solution, the subscriber’s
private
email key is stored on the device and protected by a personal password
which
is never divulged to Pryvate™.
In regions where VoIP calls and IM are blocked by operators or
governments,
the system will automatically detect the situation and utilise the
secure,
encrypted and private network provided by our software.
In regions where anti-blocking technology may be a concern, our software
will present the host with Pryvate’s™ public IP address so that the
remote
host does not detect the subscriber’s actual IP address. This then
prevents
the host from determining the subscriber’s location.
All aspects of security are considered when you use Pryvate™.
Pryvate’s™ default method of key management ensures privacy for our subscribers as neither us nor any associated parties have any access to the end user’s private keys. This prevents Pryvate™ or any associated party from being a target for any information related to the user’s private keys. The voice and IM keys are generated per session by the Pryvate™ application on the user’s device and are discarded at the end of the session. The email application private keys are held on the device.
Pryvate™ has developed a VoIP anti-blocking solution for users who wish to bypass illegitimate firewall restrictions on 3G networks.
Numerous Countries block voice-over-internet protocol (VoIP) calls as they are seen as a:
When making a call, a ‘session initiation protocol’ (SIP), is used to
allow
two endpoints to shake hands – then a ‘real-time transport protocol’
(RTP)
carries the traffic. Our system works in real time by ‘tunneling’ the
SIP
and RTP traffic into a single encrypted HTTPS connection, using flexible
virtual tunneling architectures to achieve seamless voice and video
calls.
We utilize a ‘tunnel client library’ that is integrated into the user’s
Apple or Android device and a tunnel server that is deployed inside
Pryvate’s network infrastructure. The tunnel server uses the data of
each
secure connection to recreate the SIP and RTP traffic from the client’s
smartphone.
Its principle is tunneling all SIP and RTP traffic through a single
secure
https connection up to a detunnelizer server. Our solution comprises:
We tunnel all SIP and RTP traffic through a single, secure https
connection
up to a detunneliser server. Our solution comprises:
It is not just a general purpose VPN.
Pryvate’s™ front end applications will be supported by a backend
registration
service for voice and instant messaging, user presence and availability
information. Key servers will be established for the email application,
storing and synchronising keys within the PRYVATE TECHNOLOGIES Ltd
network.
Anonymous browsing is achieved through a network of globally distributed
servers that randomly route traffic through the network, between the
user’s
device and the destination internet site, anonymising the source address
on
each hop.
The backend services are supplied by PRYVATE TECHNOLOGIES Limited’s server pools,
which
will initially be a single site service that will be expanded to a
globally
distributed service. The global service rollout will have no impact on
the
customer experience as the distribution of traffic to the various
geographical services will be handled through DNS and will require no
changes to the applications.
Initially the DNS services will be supplied through a third party, but
an
internal DNS service will be set up before switching all device traffic
to
the PRYVATE TECHNOLOGIES Ltd network. The decision to switch will be
based
upon the number of customers, the types of service in use and the cost
and
maintenance of a global server network to service the customer base.