ANDROID ENCRYPTION

Millions of people around the globe use and trust Android smartphones.

Since its release, the Android platform has never been sufficiently secure enough to store and communicate truly confidential data... Until now!

Based on Samsung's Knox defense-grade security platform, Phantom Secure has created a multi-layered encrypted Android device that guarantees your communications will remain secure and only accessible by other Phantom Secure clients.

Phantom Secure combines cutting-edge hardware with the most powerful security features available for a comprehensive privacy solution trusted by the world’s most security conscious professionals.

After years of research and development we are proud to deliver a truly secure experience on Android that provides our clients with uncompromised security with the latest hardware and technology.

BLACKBERRY ENCRYPTION

For more than 15 years Blackberry has been synonymous with mobile security.

BlackBerry has over 50 security certifications and approvals, more than any other mobile vendor including the only “Full Operational Capability” approval to run on U.S. Department of Defense networks.

Fortune 500 companies, financial institutions, law firms, national defense departments and even the Oval Office trust Blackberry to secure their mobile communications.

Blackberry has integrated layers of security within its products, from software to hardware to infrastructure, enabling a true “end-to-end” security platform.

When it comes to true end-to-end security trusted by the world’s most powerful leaders, the choice is simple... a Phantom Encrypted Blackberry.

WHAT IS PGP?

PGP is an encryption technology that is used to secure digital documents and messages.

In 1991 Phil Zimmermann created PGP so that like-minded people could communicate securely without invasion of privacy.

Since then PGP has been utilized worldwide by both in both private and public sectors to encrypt and send sensitive communications.

The real strength of PGP is found in its keys, measured in bits. Phantom Secure PGP encryption utilizes keys that are 4096-bit.
Each randomly generated PGP key is one of 2^4096 possible combinations and must be expressed as an exponent because the actual number representing the full range of possible combinations is more than 1,200 digits long. Finding a matching combination is impossible.
Even with the aid of the world’s most advanced super computers, no one (including the world’s leading intelligence agencies) has ever been able to find the keys to decrypt data encrypted with 4096-bit PGP. It is simply unbreakable.

PGP encryption technology provides the highest level of communication security available today.

Learn more about how PGP works

WHAT IS PGP?

PGP is an encryption technology that is used to secure digital documents and messages.

In 1991 Phil Zimmermann created PGP so that like-minded people could communicate securely without invasion of privacy.

Since then PGP has been utilized worldwide by both in both private and public sectors to encrypt and send sensitive communications.

The real strength of PGP is found in its keys, measured in bits. Phantom Secure PGP encryption utilizes keys that are 4096-bit.
Each randomly generated PGP key is one of 2^4096 possible combinations and must be expressed as an exponent because the actual number representing the full range of possible combinations is more than 1,200 digits long. Finding a matching combination is impossible.

Even with the aid of the world’s most advanced super computers, no one (including the world’s leading intelligence agencies) has ever been able to find the keys to decrypt data encrypted with 4096-bit PGP. It is simply unbreakable.

PGP encryption technology provides the highest level of communication security available today.

Learn more about how PGP works.

AES, ECC, DOUBLE RATCHET AGORITHM

AES 256 has been the most scrutinized symmetric encryption algorithm in the world. It has been highly reviewed and updated over the years to be secure, fast and hardware accelerated.

ECC stands for Elliptical Curve Cryptography, and ECC 25519 has a higher effective bit strength than OTR’s 1536-bit DH key. In fact, ECC 25519 Is the most trusted ECC Curve.

The Double Ratchet Algorithm is another added layer of security with many desirable properties including:

  • creating a new key with every message
  • the ability to protect past messages even if the key is compromised
  • allowing two parties to verify each other while staying hidden from any prying third parties, and more!