top of page

ABSOLUTE SECRECY PROVIDERS

The Absolute Zeros Standard

 

ZERO TRUST  >  "Trust Nothing, Nobody, Nowhere" Assuming Always a State of Compromise

ZERO KNOWLEDGE  > Data That Cannot Be Read Is Useless to Cyber Criminals     


ZERO STORAGE > "You Cannot Hack What Isn't There" Encryption Keys Never Stored or Exchanged 

 

ZERO RISKS> "Shutting down the fear of getting classified data compromised"

ZERO EFFORTS> "Cyber mindfulness" Non Complex Systems . Easy and Quick Deployment 

IMG-9527.JPG
No login info for entering the platform 

The User needs to enter a "Secret Passphrase"

This Passphrase is not a password 

The passphrase inserted, along with our encryption algorithms creates on the spot 4 different encryption keys that will be used for encrypting the data, with 4 different symmetric encryption systems, in 4 consecutives times, it means each file is encrypted 4 times, with 4 different encryption keys, and 4 different encryption systems

The + sign below the passphrase windows allows multiple people to participate in the encryption of the data, what is called "Multi Signature" scenario , where two or more user encrypt the same data, while no one knows the passphrase of the other person and for then decrypting the joint encrypted file, both of them will have to insert their own secret phrase


 
Crygma  Encryption Tech

Crygma Encryption Tech

Play Video
Own the Most Powerful Encryption Platform in the World
Screenshot (1514).png
The Passphrase can be written in any language with any letters or symbols

When Encrypting Data to be stored it is important to memorize the passphrase otherwise the data encrypted cannot be deciphered, there is no backup, anywhere 

When sending an encrypted file to a third party, upon its arrival, in order for them to decipher the data,  they will need the same exact encryption system, and they will need to insert the same passphrase, this is called "Pre Shared Secret". Ways to create pre shared passphrases will be discussed later 


 
You now entered the main dashboard, and you can choose between encrypting or decrypting 

Any type of file can be encrypted, in addition you can encrypt instantly text messages, videos and audio messages taken on the spot 
You type the text message, click encrypt and the encrypted message shows up, you can opt to copy the encrypted text, paste it and send it ( for example on an email) or you can scan, take a  picture, copy, save or share the QR code generated, that actually is the actual text message. 

The advantage of the QR code is that the transfer of the encrypted data , out of the Cipher Machine is done visually ( by scanning) , without any physical connection needed, what is called "Pure Air Gapped" Transfer
Screenshot_20230301-112855_Notes.jpg

Sending an Ultra Encrypted Message to a third party, online, without ever actually sending him anything!

SAFER THAN A FACE TO FACE MEETING

The sender encrypt a text message on his Offline Cipher Machine, scan the QR code with his internet connected device and share the QR code on an anonymous account on any social media. Then the receiver just needs to reach that post and scan the QR code shared with his Offline Cipher Machine and read the plain text message.

TWO PARTIES COMMUNICATING IN A FULLY ENCRYPTED WAY, TOTALLY OFFLINE 
WITHOUT LEAVING ANY DIRECT DIGITAL TRACE ONLINE

 
IMG-0829.JPG
Hiding "Encrypted" Files, within "everyday" images  for then deciphering it with your offline cipher machine
IMG-9940.JPG
Hiding Top Secret "Encrypted" Text within "everyday" text for then deciphering it with your  offline cipher machine

The Crygma Cipher System

 

1) Quantum Safe Anti Ransomware Data Storage

 

2) Private , Unique Encryption System with dedicated set of encryption algorithms 

 

3) Ultra Encrypted Covert Communications and Files Transfers

 

$ 800,000 USD One YEAR License:

Unlimited installs on Android and Windows PCs 

 

On Site , Personal, Professional training of the company's team to quantum safe encryption methodologies and top classified, ultra encrypted communications. 

On site Installations 

 

One year , 24/7

Full Online Technical Support

+ Ongoing upgrades and maintenance .

 

 

Free_Sample_By_Wix.jpeg
Screenshot_20230301-114258_Notes.jpg
Let's encrypt a file !

You click on the main dashboard " encrypt / file " 

Then you choose a file to encrypt from your folders on the cipher machine,
you click encrypt and you will see the encrypted file with extension ".dbenc" . 

You can now save the encrypted file on the device or share it in different ways,
in this below example it has been send by Gmail. 
IMG-9993.jpg
Screenshot (1523).png
ANTI SPYWARE 

ANTI DIGITAL FORENSIC 

ANTI RANSOMWARE



"Data That Cannot Be Read Is
Useless To Cyber Criminals"


 
IMG-9860.JPG
Software for Creating Complex OTP Passhrases
Generating Additional Layers of Encryption 
Let's now choose to encrypt an image and an audio message. 

Both can be executed in two ways: 

either you choose from your saved files, an image or audio file to encrypt , or you take a picture on the spot or register an audio message in real time and then device if to store or share the encrypted files generated.
Screenshot_20230301-114909_Notes.jpg
Screenshot_20230301-120826_Package installer.jpg
The same as Encryption, you have the opposite option of "Decryption". 

You can choose to decrypt an encrypted text received or a file.

You can opt to decipher encrypted files received in the form of a QR code. 

And of course you can decrypt files stored already on your cipher machine.  


 
Offline Cipher Machine
for Windows 
IMG-9814.JPG
Certification & Legal


1. Tested, Certified and Licensed by the Monaco Government

2. Acting as Software House 

3. Open Source Public Encryption Algorithms 

4.Not Responsible of Hacking or Interception

5.Partial 
Warranty for Encryption Deciphering

6. Trust: Offline, Demo Trial, Keys, User Double Crypt
 



 
Mockup.jpg
bottom of page