encrypted mobile communications

17

Upload: phantom-encrypt

Post on 09-Feb-2017

274 views

Category:

Mobile


0 download

TRANSCRIPT

WHO WE ARE

Protecting civil liberties and the right to secure, private communication for ourexclusive network of clients is our core mandate.

Our encryption algorithm has never failed, never been cracked and in over 10years of business we have never disappointed a single client. By continuallyinnovating, while holding firm to our founding principals, we have secured ourposition as the industry leader.

At Phantom Encrypt eliminating the risk of privacy invasion and detrimental data theft is the very core of our business. We pride ourselves on delivering a truly impenetrable barrier of security that ensures our clients’ communications can never be intercepted.

Phantom Encrypt is an independent, privately owned company. We have neither affiliation nor obligation to any third party entity. Our only obligation is to our clients.

WHAT WE DO

We have been delivering military grade mobile encryption solutions on theBlackberry device platform for more than 10 years, without a single breach insecurity.

Phantom Encrypt offers the only proven, time-tested means of communicating securely in total anonymity with PGP encrypted email. Our military grade encryption technology ensures that your private communications stay private and can only be read by your intended recipients.

1

YOUR RIGHT TO PRIVACY

Protecting civil liberties and the right to secure private communication for ourexclusive network of clients is our core mandate.

Hackers want to steal your personal and financial details. Competitors conspireto intercept your internal agenda and gain the upper hand. Shady agenciesshamelessly violate your constitutional right to privacy, without pretense bymonitoring every email, text message and phone call.

Phantom Encrypt offers the only proven, time tested means of communicating securely, in total anonymity, with PGP encrypted email on the mobile blackberry device platform.Our military grade encryption technology ensures that your private communications stay private and can only be read by your intended recipients.

WHY ENCRYPT YOUR DATA

Do you stand to suffer detrimental loss if your private communications or datawere to fall into the wrong hands?

With cyber crime on the rise, conventional means of communication are not asecure way to transmit sensitive, confidential information and unfortunately,“what you say can and will be used against you”.

Large corporations and government agencies spend millions to secure theirinterests from data theft during transmission. Isn't your confidentialinformation also worth protecting?

At Phantom Encrypt eliminating the risk of privacy invasion is the foundation of our business. Safeguard your interests today and enjoy true peace of mind by joining the Phantom Encrypt exclusive network.

2

WHY BLACKBERRY ENCRYPTION

For more than 15 years BlackBerry has been synonymous with mobile security.

Today, threats to mobile security have reached a critical point. Hacker attacks,malware epidemics, multi million-dollar data breaches, or reports of spyingappear frequently in the daily news.

Today, security and privacy are hot topics for everyone who owns a mobiledevice. Governments and enterprises need to secure their data to ensure thatit doesn’t fall into the wrong hands. High-profile corporate data leaks havecaused tremendous damage and drawn attention to the need for secureEnterprise Mobility Management (EMM).

Global financial services companies, top law firms, health care providers, lawenforcement, defense departments and even the Oval Office trust blackberryto secure their mobile communications. BlackBerry has over 50 security certifications and approvals, more than anyother mobile vendor including the only “Full Operational Capability” approvalto run on U.S. Department of Defense networks.

United States President, Barack Obama told an interviewer that as much as heloves the iPhone, the secret service won’t let him use it because they can'tsecure it like they can a BlackBerry.

Blackberry builds security into every layer of their products, from software andhardware to infrastructure, for a true “end-to-end” security platform.

BlackBerry supports a variety of ways to keep your data private, includingpasswords, two-factor authentication and data encryption.BlackBerry operating systems are compatible with a full range ofauthentication and encryption solutions, including military grade PGP.

New threats are constantly emerging and Blackberry continues to innovate anddevelop improved security technologies to defend and fortify the privacy oftheir products.

When it comes to true end-to-end security trusted by the world’s mostpowerful leaders, the choice is simple.

3

WHAT IS PGP

PGP is a data encryption program that provides cryptographic privacy andauthentication for data communication. PGP is used for signing, encrypting,and decrypting e-mail communications.

Phil Zimmermann created PGP in 1991, while working atPKWARE Inc. This enterprise software company founded in1986 provides encryption and data compression software usedby thousands of organizations.

Zimmermann created PGP encryption so that like-mindedpeople could communicate securely without invasion ofprivacy.

Shortly after its release to the public, PGP encryption found its way outside theUnited States. In February of 1993, Zimmermann became the target of aninvestigation by the US Government for "munitions export without a license".

Cryptosystems using keys larger than 40 bits were then considered munitionswithin the definition of the US export regulations. PGP has never used keyssmaller than 128 bits, so it qualified at that time.

Penalties for violation, if found guilty, were substantial. After several years, theinvestigation of Zimmermann was closed without filing any charges against himor anyone else.

Since then PGP has been utilized worldwide by both private and public sectororganizations to encrypt sensitive communications in banking, financialservices, healthcare and government etc.

4

HOW PGP WORKS

PGP encrypts messages for the intended recipient using AES-256-bit and 4096-bit PGP keys (Public and Session Keys) on your BlackBerry.

When you create a message on your Phantom Encrypt encrypted Blackberry device the following occurs:

1. PGP compresses your plain text email message. Data compression savestransmission time and more importantly strengthens encryptionsecurity. Most cryptanalysis techniques exploit patterns andcompression reduces these patterns in the plain text, thereby greatlyenhancing resistance to cryptanalysis.

2. PGP will then create a random unique one time 4096-bit Session Key.The email message will then get encrypted with the Session Key usingAES-256 algorithm creating an encrypted text (cipher text). Anencrypted text appears as random numbers, letters, and symbols.

For example: simple text such as “hello,” it would appear outside of yourdevice and your intended recipient’s device encrypted as the following:

hQIOA68nz9GqU7SREAgAxWfwvpziO4N6KquxmeuYD/txfTceyXRZGVqAGFUGmOdE+K9PCLp/+p3cFC8OcOZg8WReI4wlpYzgS3/XsB4LL9MegSHwjjI9jNsnQOr9EeLAIgDEb1NeXZ499qnSY1ZvCy/VCF1O7H71y77VQTckpfyHgWvzka

3. Once the data is encrypted, the Session Key is then encrypted to therecipient's Public Key. PGP combines the encrypted text and encryptedkeys into one message before the message is sent from your devicecreating an “encrypted package”

4. This Public Key encrypted Session Key is transmitted along with thecipher text to the intended recipient (corresponding Private Key). PGPthen encrypts the Session Key with the intended recipient’s Public Key.The Public Key is stored with a unique Phantom Email Address you havesaved in your address book. All you need to know is who you arecontacting and the PGP software handles the rest.

5. After clicking send, your BlackBerry makes a secure AES-256 encrypted connection to the Phantom Encrypt fully encrypted private offshore network.

5

6. Your encrypted message is then sent to Phantom Secure’s offshorenetwork. Your message stays encrypted throughout its entiretransmission. Only the intended recipient can receive and decrypt yourmessage.

7. The encrypted message then goes from Phantom Secures offshorenetwork to the recipient’s BlackBerry over the same secure channel.Phantom’s network does not save any information. It is only set up torelay encrypted messages and to monitor any suspicious activities fromoutsiders.

8. The recipient's copy of PGP uses his or her Private Key and passphrase torecover the temporary Session Key, which PGP then uses to decrypt thecipher text.

9. After the intended recipient receives the encrypted package, he or shecan decrypt the message “hello” by using his or her unique Private Key(found only on the recipient’s device) and passphrase. A message canonly be sent from an email’s Public Key to its corresponding Private Key.

HOW STRONG IS PGP ENCRYPTION

The real strength of PGP is found in its key, which is measured in bits. Phantom Encrypt PGP encryption utilizes keys that are 4096-bit in size.

The size of a key is directly related to the strength of the encryption as it is theonly way you can decrypt a message (by having the email’s Public Key, PrivateKey, and passphrase).

To give you an idea of the size of a key, the following is an example of what isconsidered today as the minimum size key required for an encryption algorithmto be secure.

A 1024-bit key is a 308-digit number that looks similar to the following:

10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000.

6

With Phantom Encrypt, your private keys are generated as a combination of numbers, letters, and symbols that is one of 2/4096 possibilities. The probability of finding your key in this pool of possibilities is impossible. If this sounds confusing imagine the number above as having not 308 but 1234 digits. It is difficult for the common person to grasp how this seemingly infinite number relates to encryption strength but the proof lays in the simple fact that no one and no combination of super computers has ever been able to find or recreate the correct keys that are assigned to an encrypted email. This is the strength of PGP encryption technology that has been tried and tested for more than three decades. It is simply unbreakable.

YOUR Phantom Encrypt PGP ENCRYPTED EMAIL ADDRESS

Our client’s will receive an exclusive email address. The email address on thedevice will have two unique-4096 bit PGP keys associated with it. The firstbeing the Public Key (shared) and the second being the Private Key, which isfound only on the device

WHAT IS A PASSPHRASE

A passphrase is a longer version of a password. A passphrase is more secureagainst standard dictionary attacks because even if a hacker tries all the wordsin the dictionary in an attempt to determine your passphrase, he or she will notbe able to crack it. The best passphrases are relatively long and complex andcontain a combination of uppercase and lowercase letters, numbers, andpunctuation characters. PGP uses a passphrase to encrypt your private key onyour BlackBerry device.

7

PGP KEYS

There are three types of 4096-bit keys used in PGP – Public, Private, andSession. Public and Private Keys are unique for the Phantom Email Address onour device. PGP keys are generated using special encryption algorithms by thePGP software.

PUBLIC KEY

A Public Key is one of two keys on a Phantom PGP email. It acts like a lock onthe encrypted message you create for a person, which can be opened by itsPrivate Key that resides only on the intended recipient’s BlackBerry. As thename indicates, this key can be shared with others, which acts like a direct lineonly to you.

PRIVATE KEY

A Private Key is one of two keys on a Phantom PGP email. This key is found onlyon your BlackBerry device. This key along with the passphrase can decryptincoming PGP encrypted messages.

SESSION KEY

A Session Key is a one-time generated key used with the initial encryption of amessage on your device.

The main function of PGP keys is to make it impossible for anyone to decrypt aPGP message without knowledge of the contact’s keys. In order to decrypt anyPGP message you must have the contact’s Public Key, Private Key andpassphrase. Considering PGP keys are 4096-bit in size, the chance of decryptingany message on your device is impossible.

Currently no brute force attack is capable of finding the right keys to decrypt aPGP message. PGP keys are also used to ensure that only the intendedrecipient can receive and decrypt the messages because emails can only besent from a contact’s Public Key to its corresponding Private Key

8

THE Phantom Encrypt CORE

UNBREAKABLE MILITARY GRADE ENCRYPTION

Our encryption algorithm is military grade. It has never been cracked, hacked orbroken, operating for more than 10 years without a single breach in security.The 4096 bit-key end-to-end (device to device) encryption algorithm randomlygenerates a unique encryption key (session key) with each communication. Thiskey is found only on the sender’s device. It is impossible to duplicate andwithout it the message is impossible to open or decipher.

All of our secure email addresses are assigned exclusive 4096-bit PGP keys(public and private). The result is a fully encrypted message that is encryptedon the device before sending, that stays encrypted during its entiretransmission, and can only be sent to and read by the intended recipient’sdevice. There is no known method for compromising our encryption barrier inexistence. It is simply unbreakable.

UNLIMITED INTERNATIONAL ROAMING

In today’s global economy, international business people demandinstant connectivity wherever they travel. Our unlimited international roamingpackages provide instant, automatic connectivity anywhere a 3G-network signal can be found. Keeping you connected worldwide, at all times,on the same device.

In critical situations where the success or failure of an opportunity depends on timely secure communication, our unlimited international roaming feature makes a world of difference. No need to waste time and money searching for additional devices or local SIM cards, while your clients or partners wait. Phantom Encrypt encrypted devices connect instantly to any local 3G-network, delivering the same uncompromised security anywhere you travel, at no additional cost.

9

EXCLUSIVE CLOSED-LOOP NETWORK

Because a chain is only as strong as its weakest link, Phantom Encrypt operates exclusively on a “closed loop” network. This means that individuals who communicate with inferior encryption services cannot infiltrate the Phantom Encrypt network of clients. This feature is perhaps the most important of our core principles. Clients who truly value their privacy and demand peace of mind settle for nothing less than a closed loop service.

Phantom Encrypt provides a Private Messaging Service unlike any other because we take the additional steps required to protect our clients, by eliminating any risk of outside threats.

PRIVATE LOOP NETWORK CONFIGURATION

To further enhance the exclusivity of your closed-loop communications, we are proud to offer Private Loop Network configuration. Now you can limit your network to intra-company communications by restricting messaging to your private circle of contacts. Phantom Encrypt will create a custom domain for the exclusive use of your company. Rest assured, your private communications will go no further.

10

PRIVATE OFFSHORE SERVERS

Our private servers are located in offshore regions favorable to anonymousencrypted communications.

We have strategically built our secure server installations in regions that hold no treaties with foreign governments; meaning that under law, no foreign body can disrupt our service or seize our private property. This key asset of the Phantom Encrypt global infrastructure guarantees our amnesty from potential foreign threats.

INSTANT DIGITAL SHREDDING

Our servers automatically, digitally shred any trace of your encrypted communication once it has relayed to the recipient’s device. Unlike a typical server, which stores an imprint of the communication indefinitely, Phantom Encrypt servers simply relay the message without decrypting or storing an imprint.

Our clients can be certain that no trace of any communication they send existsanywhere beyond what is stored on the sender’s and recipient's devices. Oncethose messages have been deleted, they are gone forever.

MULTIPLE SECURE SATELLITE SERVER LOCATIONS

Phantom Encrypt offers a guarantee of uninterrupted service by operating multiple satellite server locations. While the competition tries to cut costs by centralizing servers to a single location with the cheapest possible overhead, we pride ourselves on providing multiple back-ups.

If one of our server locations is damaged or destroyed by sabotage, war ornatural disaster, the rest of the servers immediately fill the gap to ensure thatour clients can always communicate uninterrupted.

Service disruptions are a common complaint we routinely hear from new clients that have tried working with other providers. We understand that our clients have a lot on the line, and to suddenly lose communication with their network of colleagues can be costly, embarrassing and even dangerous. This is simply not the way to conduct business on an elite level and at Phantom Encrypt, we hold ourselves to the higher standard for which we are known and trusted.

11

INSTANT REMOTE DATA WIPE

A feature that many of our clients have utilized in high-risk situations is ourInstant Remote Data Wipe service.

If your device or a colleague’s device is lost or should somehow fall into thewrong hands, simply contact our 24-hour support department to order aninstant remote data wipe. Wherever the device may be, all stored data iscompletely wiped, restoring the device to factory settings.

All private information is permanently deleted including messages, notes, files, contacts, settings, and of course, the PGP encrypted messaging service is deactivated permanently. This failsafe is another way that Phantom Encrypt delivers peace of mind.

TOTAL CLIENT ANONYMITY

To ensure your privacy, your purchase is kept completely anonymous. Totalanonymity means that we will never ask our clients for any personal details. Westrongly urge our clients to be weary of any provider that asks for even themost basic personal details. It is simply not required and totally defeats thepurpose of what encrypted communication is all about.

The idea is to be able communicate securely in total anonymity, not to draw attention to yourself. At Phantom Encrypt, we have done our due diligence and continually invest in our global corporate structure to ensure that our company is not obligated to collect any client details.

Other communication services may not share the same values, have the same expertise or operate within the same international corporate framework as Phantom Encrypt. Other services may use your personal information for purposes undisclosed to you or be forced to reveal your identity.

We do not require any personal information and nor do we maintain anyrecords of your communications. Put Simply, there is nothing for anyone toaccess, including us.

12

PERSONAL ON-THE-GROUND SUPPORT

Our highly trained and knowledgeable agents are located in every mainbusiness hub around the globe. We are never far away when it comes tokeeping you connected with personal on-the-ground support. Your local agentis always available to meet a new client or support an existing relationship,because when it comes to securing your communications, delays can be costly.

Our clients have come to trust and demand the premium products and support that Phantom Encrypt delivers. We’re constantly pushing to raise standards by carefully selecting only top performing candidates to join our ranks. These strict hiring practices set us apart from the competition and help secure our position as the most widely used and trusted provider in the industry worldwide.

At Phantom Encrypt we understand that in the encrypted mobile telecommunications industry "you get what pay for”. Our clients pay for top-level privacy protection and we personally deliver a premium service that never fails.

24-HOUR GLOBAL SUPPORT

24 Hour global technical support protects your business from costly delays.

Should you or anyone in your network experience technical issues with adevice, contact us immediately for around the clock support. We understandthat in highly sensitive business ventures, timing can be pivotal.

When our clients need to communicate securely, they need technical issuesresolved immediately, not the following day during “regular business hours”.When you pay for premium service, you deserve around the clock support.

13

WHY CHOOSE Phantom Encrypt

Over the years the need for encrypted communication has grown worldwide. Thousands of top-tier business people have come to trust and rely on the Phantom Encrypt service to secure their private communications.

Your competitors invest heavily in network security to safeguard their strategy.They hire specialists to intercept the intel that could reveal your confidentialplans. Social media keeps track of your personal associations and affiliations.Search engines store your browsing history. It is now common knowledge thatagencies like the NSA can easily listen in on your every phone call, read everytext message and have been monitoring online activity like emails, payments,downloads and transfers, since 2003.

In today’s electronic age the risks to your personal privacy are greater thanever. Invasion of privacy and data theft are a common occurrence especiallywhen it comes to mobile communication. Intrusive agencies want to track yourevery word and hackers want to steal your personal data. The competitivecorporate environment is more ruthless than ever and business ethics take abackseat to turning a profit, behind closed doors.

With standard means of communication you cannot control who has access toyour information and unfortunately, “what you say can and will be used againstyou”. Our competitors claim to offer the same level of protection but try tounder-cut the true cost of secure communication. They simply can’t afford, orrefuse to invest in the necessary international infrastructure required tosubstantiate their claims. Sadly it is their clients that end up paying the trueprice in the end, often with loss of valuable and sensitive private data.

Many important opportunities have been jeopardized or even failed whenprivate knowledge was leaked to the media and made public. The value of afirst mover advantage is greatly diminished once your competitors are madeprivy to the opportunity.

Do you stand to suffer detrimental loss if your private data and communications were to fall into the wrong hands? If securing your communications is a priority then don’t settle for anything less than the guaranteed peace of mind of working with the industry leader in encrypted mobile communication technologies. Choose Phantom Encrypt today and rest assured that your private communications can never be viewed by anyone other than those you choose.

14

BECOME A PARTNER

Partner with Phantom Encrypt and enter the mobile privacy industry.

If you want to run your own business and make a positive impact in the world by providing a high-value service, then working with Phantom Encrypt is a unique opportunity consistent with those goals.

Through our Authorized Agent Partnership Program we have achievedunparalleled success by cultivating independent business operators thatdeliver our elite products and service.

Our highly trained and knowledgeable agents are located in every mainbusiness hub around the globe and never too far away when it comes tokeeping our clients connected with personal on the ground support. A localagent is always available to meet a new client or support an existingrelationship because when it comes to securing communications delays can becostly.

Join the cause of protecting private communications and enjoy thebenefits of our international company infrastructure established over 10years leading the industry

Build your own business based on trust, pride and value as we haveearned the trust of thousands of our clients by proudly delivering thehighest performing secure global communication solutions.

Grow as part of our rapidly expanding team of Independent BusinessOwners and become the next pioneer of powerful privacy solutionsbacked by our 24-hour professional support team.

Achieve Proven Success

Our hard work and dedication have allowed us to reach the top of the industry.We have set and continually raised the standard for over 10 years. We want youto join in that tradition of success and help push the envelope even further.

Tap Powerful Resources

15

Our Business Support Department gives you full access to the most effectivetools for building your client base and managing your business operations toachieve full growth potential. We provide online and personal on theground training, marketing materials and signature packaging to ensure thatyou’re fully prepared to present a highly professional offering.

Focus On Growth

Focus on achieving rapid and continual growth while we handle the administrative work. Phantom Encrypt provides our agents with full back-end support from invoicing to technical support.

If you share our passion for protecting privacy and feel that you possessqualities consistent with our core values then we would like to position you atthe forefront of the global movement to secure mobile communications.

Becoming part of the Phantom Encrypt global network of agents will allow you to transform this mission into a highly rewarding career or develop a lucrative addition to your existing business.

Our clients have come to trust and demand the premium products and supportthat Phantom Encrypt delivers. We pride ourselves on constantly pushing toraise standards by carefully selecting only top performing candidates to joinour ranks. These strict hiring practices set us apart from the competition andensure our position as the most widely used and trusted provider in theindustry worldwide. We ensure that everyone one of our agents is well trainedand well compensated because having a highly skilled, motivated team hasalways been at the core of our success.

At Phantom Encrypt we understand that in life and in the encrypted mobile telecommunications sector "you get what pay for”. Our clients pay for top-level privacy protection and we deliver a premium service that never fails.

16