No backdoor
There is nothing that CIPHR has or knows that can be effectively used to decrypt user generated messages and content.
Learn about the overarching principles that govern the development of all CIPHR technologies.
No backdoor
There is nothing that CIPHR has or knows that can be effectively used to decrypt user generated messages and content.
User controlled keys
Private keys are generated by the user.
Self Destructing Messages
Control who has access to sent messages and for how long.
End-to-End
No data touches CIPHR servers in an unencrypted format.
Learn about some of the unique properties that comprise the CIPHR cryptosystem.
Advanced protocols and cryptographic schemes ensure that the information security properties of the service will hold true even against the cryptanalytic attacks enabled by quantum computers.
The award-winning Argon2 hash provides resistance to offline, brute-force attacks against any user data-at-rest on endpoint devices and CIPHR servers.
Improvements upon the well established Axolotl protocol, provide first class information security properties even in a post-quantum scenario.
CIPHR servers are accessible only by VPN, and leverage a strict TLS configuration and pinned certificates. By doing so, we protect against attacks such as Heartbleed or BEAST, and the compromise of certificate authorities.
Learn about the some interesting feature highlights of the CIPHR software and deployments.
Servers and software implement custom protocols aimed at providing responsive message delivery, even when connected to low-bandwidth, high-latency mobile networks.
Integration with industry leading mobile-device-management technologies facilitates additional privacy layers such as persistent VPN connections and secured device endpoints.
Optional encrypted backups of your Ciphr contacts and notes.
Text messages, images and voice are shared and stored securely.