Frequently Asked Questions
Cryptme applies commonly available open-source based solutions installed on millions of devices. Thanks to it, the solutions have been tested by a number of developers, security experts and users. The unique character of Cryptme is all about a suitable combination of applied components creating an exceptional architecture which is physically impossible to be hacked. In order to work, the system requires a provider that enables a secure exchange of encryption keys and an effective addressing of communication between the devices. On the market there are neither suitable software and hardware solutions nor any interested providers rendering their services by means of such devices. Such a service would also need to be rendered by the producer of such devices and then, if the service became more popular, as it was the case with mobile network, it would need to be legally regulated by the state, which would make the services pointless.
Both costs and technical requirements are typical obstacles to hack the securities commonly used on telecommunication market. Secret service that has the resources to put surveillance on an individual in their daily environment could opt for another, cheaper way to get access to desired data than by capturing voice communication from a properly secured device. A potential cost of hacking the securities used by Cryptme makes it too expensive compared to other, much more cost-effective methods.
If that was the case, the users of Cryptme would be pretty quickly eavesdropped on by the secret service and their information would be intercepted and used in inappropriate way. If that was the case, the system would not be trusted anymore and would have been eliminated from the market.
When this happens, the service will be disconnected.
The system provider does not have any possibility to eavesdrop on a conversation since the provider does not have any way to intercept and decipher any conversation.
The communicators installed on portable devices, e.g. mobile phones or laptops ensure secure communication provided that an attacker is not able to take control over the device where the sound coming from the microphone get converted into encrypted data streaming. Due to the architecture of typical portable devices and computers with Internet connection and the way they work it is impossible to make sure that an attacker will not take control over them. Therefore, secure communication, where very sensitive information is at stake, cannot be based on the solutions which can be easily hacked as they do not pose any financial or technical challenge for any potential opponent interested in eavesdropping on a conversation.
The applied architecture allows merely for an encrypted data transmission but not for eavesdropping on a conversation.
Cryptme solution is based on physically preventing access interfaces from taking control over a device and making encryption keys secret and not just on algorithms and particular components of the solution. Therefore, getting full recognition of the software installed on devices does not allow for taking control over the system.
Knowing the numbers of people using other terminals in a subnet and configuring voice connection with them does not allow whatsoever to take control over the caller’s terminal (temporarily or, let alone, permanently) or to eavesdrop on conversations between any other people in the network.
The sound is coded still in the phone terminal, which does not have a SIM card slot, which makes it impossible to break into and take control over it by the network provider. The SIM slot is placed in the access terminal which uses Wi-Fi network to communicate with the phone terminal and enables communication between the terminal and the Internet network – Cryptme provider and the caller’s access terminal. Consequently, taking control over the access terminal can make it possible to capture encrypted data streaming which does not allow to eavesdrop on the conversation itself. The architecture of Cryptme solution makes it impossible to intercept a conversation before encrypting it by the phone terminal.
Reverse engineering analysis is not going to allow to eavesdrop on voice communication of another device.
The provider disconnects the service which cannot operate without continuous provider’s support.