ABSOLUTE SECRECY PROVIDERS
The Absolute Zeros Standard
ZERO TRUST > "Trust Nothing, Nobody, Nowhere" Assuming Always a State of Compromise
ZERO KNOWLEDGE > Data That Cannot Be Read Is Useless to Cyber Criminals
ZERO STORAGE > "You Cannot Hack What Isn't There" Encryption Keys Never Stored or Exchanged
ZERO RISKS> "Shutting down the fear of getting classified data compromised"
ZERO EFFORTS> "Cyber mindfulness" Non Complex Systems . Easy and Quick Deployment
No login info for entering the platform
The User needs to enter a "Secret Passphrase"
This Passphrase is not a password
The passphrase inserted, along with our encryption algorithms creates on the spot 4 different encryption keys that will be used for encrypting the data, with 4 different symmetric encryption systems, in 4 consecutives times, it means each file is encrypted 4 times, with 4 different encryption keys, and 4 different encryption systems
The + sign below the passphrase windows allows multiple people to participate in the encryption of the data, what is called "Multi Signature" scenario , where two or more user encrypt the same data, while no one knows the passphrase of the other person and for then decrypting the joint encrypted file, both of them will have to insert their own secret phrase
Crygma Encryption Tech
Own the Most Powerful Encryption Platform in the World
The Passphrase can be written in any language with any letters or symbols
When Encrypting Data to be stored it is important to memorize the passphrase otherwise the data encrypted cannot be deciphered, there is no backup, anywhere
When sending an encrypted file to a third party, upon its arrival, in order for them to decipher the data, they will need the same exact encryption system, and they will need to insert the same passphrase, this is called "Pre Shared Secret". Ways to create pre shared passphrases will be discussed later
You now entered the main dashboard, and you can choose between encrypting or decrypting
Any type of file can be encrypted, in addition you can encrypt instantly text messages, videos and audio messages taken on the spot
You type the text message, click encrypt and the encrypted message shows up, you can opt to copy the encrypted text, paste it and send it ( for example on an email) or you can scan, take a picture, copy, save or share the QR code generated, that actually is the actual text message.
The advantage of the QR code is that the transfer of the encrypted data , out of the Cipher Machine is done visually ( by scanning) , without any physical connection needed, what is called "Pure Air Gapped" Transfer
Sending an Ultra Encrypted Message to a third party, online, without ever actually sending him anything!
SAFER THAN A FACE TO FACE MEETING
The sender encrypt a text message on his Offline Cipher Machine, scan the QR code with his internet connected device and share the QR code on an anonymous account on any social media. Then the receiver just needs to reach that post and scan the QR code shared with his Offline Cipher Machine and read the plain text message.
TWO PARTIES COMMUNICATING IN A FULLY ENCRYPTED WAY, TOTALLY OFFLINE
WITHOUT LEAVING ANY DIRECT DIGITAL TRACE ONLINE
Hiding "Encrypted" Files, within "everyday" images for then deciphering it with your offline cipher machine
Hiding Top Secret "Encrypted" Text within "everyday" text for then deciphering it with your offline cipher machine
The Crygma Cipher System
1) Quantum Safe Anti Ransomware Data Storage
2) Private , Unique Encryption System with dedicated set of encryption algorithms
3) Ultra Encrypted Covert Communications and Files Transfers
$ 800,000 USD One YEAR License:
Unlimited installs on Android and Windows PCs
On Site , Personal, Professional training of the company's team to quantum safe encryption methodologies and top classified, ultra encrypted communications.
On site Installations
One year , 24/7
Full Online Technical Support
+ Ongoing upgrades and maintenance .