SlideShare a Scribd company logo
1 of 17
Download to read offline
WHO WE ARE
Protecting civil liberties and the right to secure, private communication for our
exclusive network of clients is our core mandate.
Our encryption algorithm has never failed, never been cracked and in over 10
years of business we have never disappointed a single client. By continually
innovating, while holding firm to our founding principals, we have secured our
position as the industry leader.
At Phantom Encrypt eliminating the risk of privacy invasion and detrimental
data theft is the very core of our business. We pride ourselves on delivering a
truly impenetrable barrier of security that ensures our clients’ communications
can never be intercepted.
Phantom Encrypt is an independent, privately owned company. We have neither
affiliation nor obligation to any third party entity. Our only obligation is to our
clients.
WHAT WE DO
We have been delivering military grade mobile encryption solutions on the
Blackberry device platform for more than 10 years, without a single breach in
security.
Phantom Encrypt offers the only proven, time-tested means of communicating
securely in total anonymity with PGP encrypted email. Our military grade
encryption technology ensures that your private communications stay private
and can only be read by your intended recipients.
1
YOUR RIGHT TO PRIVACY
Protecting civil liberties and the right to secure private communication for our
exclusive network of clients is our core mandate.
Hackers want to steal your personal and financial details. Competitors conspire
to intercept your internal agenda and gain the upper hand. Shady agencies
shamelessly violate your constitutional right to privacy, without pretense by
monitoring every email, text message and phone call.
Phantom Encrypt offers the only proven, time tested means of communicating
securely, in total anonymity, with PGP encrypted email on the mobile blackberry
device platform.Our military grade encryption technology ensures that your
private communications stay private and can only be read by your intended
recipients.
WHY ENCRYPT YOUR DATA
Do you stand to suffer detrimental loss if your private communications or data
were to fall into the wrong hands?
With cyber crime on the rise, conventional means of communication are not a
secure way to transmit sensitive, confidential information and unfortunately,
“what you say can and will be used against you”.
Large corporations and government agencies spend millions to secure their
interests from data theft during transmission. Isn't your confidential
information also worth protecting?
At Phantom Encrypt eliminating the risk of privacy invasion is the foundation of
our business. Safeguard your interests today and enjoy true peace of mind by
joining the Phantom Encrypt exclusive network.
2
WHY BLACKBERRY ENCRYPTION
For more than 15 years BlackBerry has been synonymous with mobile security.
Today, threats to mobile security have reached a critical point. Hacker attacks,
malware epidemics, multi million-dollar data breaches, or reports of spying
appear frequently in the daily news.
Today, security and privacy are hot topics for everyone who owns a mobile
device. Governments and enterprises need to secure their data to ensure that
it doesn’t fall into the wrong hands. High-profile corporate data leaks have
caused tremendous damage and drawn attention to the need for secure
Enterprise Mobility Management (EMM).
Global financial services companies, top law firms, health care providers, law
enforcement, defense departments and even the Oval Office trust blackberry
to secure their mobile communications.
BlackBerry has over 50 security certifications and approvals, more than any
other mobile vendor including the only “Full Operational Capability” approval
to run on U.S. Department of Defense networks.
United States President, Barack Obama told an interviewer that as much as he
loves the iPhone, the secret service won’t let him use it because they can't
secure it like they can a BlackBerry.
Blackberry builds security into every layer of their products, from software and
hardware to infrastructure, for a true “end-to-end” security platform.
BlackBerry supports a variety of ways to keep your data private, including
passwords, two-factor authentication and data encryption.
BlackBerry operating systems are compatible with a full range of
authentication and encryption solutions, including military grade PGP.
New threats are constantly emerging and Blackberry continues to innovate and
develop improved security technologies to defend and fortify the privacy of
their products.
When it comes to true end-to-end security trusted by the world’s most
powerful leaders, the choice is simple.
3
WHAT IS PGP
PGP is a data encryption program that provides cryptographic privacy and
authentication for data communication. PGP is used for signing, encrypting,
and decrypting e-mail communications.
Phil Zimmermann created PGP in 1991, while working at
PKWARE Inc. This enterprise software company founded in
1986 provides encryption and data compression software used
by thousands of organizations.
Zimmermann created PGP encryption so that like-minded
people could communicate securely without invasion of
privacy.
Shortly after its release to the public, PGP encryption found its way outside the
United States. In February of 1993, Zimmermann became the target of an
investigation by the US Government for "munitions export without a license".
Cryptosystems using keys larger than 40 bits were then considered munitions
within the definition of the US export regulations. PGP has never used keys
smaller than 128 bits, so it qualified at that time.
Penalties for violation, if found guilty, were substantial. After several years, the
investigation of Zimmermann was closed without filing any charges against him
or anyone else.
Since then PGP has been utilized worldwide by both private and public sector
organizations to encrypt sensitive communications in banking, financial
services, healthcare and government etc.
4
HOW PGP WORKS
PGP encrypts messages for the intended recipient using AES-256-bit and 4096-
bit PGP keys (Public and Session Keys) on your BlackBerry.
When you create a message on your Phantom Encrypt encrypted Blackberry
device the following occurs:
1. PGP compresses your plain text email message. Data compression saves
transmission time and more importantly strengthens encryption
security. Most cryptanalysis techniques exploit patterns and
compression reduces these patterns in the plain text, thereby greatly
enhancing resistance to cryptanalysis.
2. PGP will then create a random unique one time 4096-bit Session Key.
The email message will then get encrypted with the Session Key using
AES-256 algorithm creating an encrypted text (cipher text). An
encrypted text appears as random numbers, letters, and symbols.
For example: simple text such as “hello,” it would appear outside of your
device and your intended recipient’s device encrypted as the following:
hQIOA68nz9GqU7SREAgAxWfwvpziO4N6KquxmeuYD/txfTceyXRZGVqA
GFUGmOdE+K9PCLp/
+p3cFC8OcOZg8WReI4wlpYzgS3/XsB4LL9MegSHwjjI9jNsnQOr9EeLAIgD
Eb1NeXZ499qnSY1ZvCy/VCF1O7H71y77VQTckpfyHgWvzka
3. Once the data is encrypted, the Session Key is then encrypted to the
recipient's Public Key. PGP combines the encrypted text and encrypted
keys into one message before the message is sent from your device
creating an “encrypted package”
4. This Public Key encrypted Session Key is transmitted along with the
cipher text to the intended recipient (corresponding Private Key). PGP
then encrypts the Session Key with the intended recipient’s Public Key.
The Public Key is stored with a unique Phantom Email Address you have
saved in your address book. All you need to know is who you are
contacting and the PGP software handles the rest.
5. After clicking send, your BlackBerry makes a secure AES-256 encrypted
connection to the Phantom Encrypt fully encrypted private offshore
network.
5
6. Your encrypted message is then sent to Phantom Secure’s offshore
network. Your message stays encrypted throughout its entire
transmission. Only the intended recipient can receive and decrypt your
message.
7. The encrypted message then goes from Phantom Secures offshore
network to the recipient’s BlackBerry over the same secure channel.
Phantom’s network does not save any information. It is only set up to
relay encrypted messages and to monitor any suspicious activities from
outsiders.
8. The recipient's copy of PGP uses his or her Private Key and passphrase to
recover the temporary Session Key, which PGP then uses to decrypt the
cipher text.
9. After the intended recipient receives the encrypted package, he or she
can decrypt the message “hello” by using his or her unique Private Key
(found only on the recipient’s device) and passphrase. A message can
only be sent from an email’s Public Key to its corresponding Private Key.
HOW STRONG IS PGP ENCRYPTION
The real strength of PGP is found in its key, which is measured in bits. Phantom
Encrypt PGP encryption utilizes keys that are 4096-bit in size.
The size of a key is directly related to the strength of the encryption as it is the
only way you can decrypt a message (by having the email’s Public Key, Private
Key, and passphrase).
To give you an idea of the size of a key, the following is an example of what is
considered today as the minimum size key required for an encryption algorithm
to be secure.
A 1024-bit key is a 308-digit number that looks similar to the following:
10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00
0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0
00,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00
0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000.
6
With Phantom Encrypt, your private keys are generated as a combination of
numbers, letters, and symbols that is one of 2/4096 possibilities. The probability
of finding your key in this pool of possibilities is impossible. If this sounds
confusing imagine the number above as having not 308 but 1234 digits. It is
difficult for the common person to grasp how this seemingly infinite number
relates to encryption strength but the proof lays in the simple fact that no one
and no combination of super computers has ever been able to find or recreate
the correct keys that are assigned to an encrypted email. This is the strength of
PGP encryption technology that has been tried and tested for more than three
decades. It is simply unbreakable.
YOUR Phantom Encrypt PGP ENCRYPTED EMAIL ADDRESS
Our client’s will receive an exclusive email address. The email address on the
device will have two unique-4096 bit PGP keys associated with it. The first
being the Public Key (shared) and the second being the Private Key, which is
found only on the device
WHAT IS A PASSPHRASE
A passphrase is a longer version of a password. A passphrase is more secure
against standard dictionary attacks because even if a hacker tries all the words
in the dictionary in an attempt to determine your passphrase, he or she will not
be able to crack it. The best passphrases are relatively long and complex and
contain a combination of uppercase and lowercase letters, numbers, and
punctuation characters. PGP uses a passphrase to encrypt your private key on
your BlackBerry device.
7
PGP KEYS
There are three types of 4096-bit keys used in PGP – Public, Private, and
Session. Public and Private Keys are unique for the Phantom Email Address on
our device. PGP keys are generated using special encryption algorithms by the
PGP software.
PUBLIC KEY
A Public Key is one of two keys on a Phantom PGP email. It acts like a lock on
the encrypted message you create for a person, which can be opened by its
Private Key that resides only on the intended recipient’s BlackBerry. As the
name indicates, this key can be shared with others, which acts like a direct line
only to you.
PRIVATE KEY
A Private Key is one of two keys on a Phantom PGP email. This key is found only
on your BlackBerry device. This key along with the passphrase can decrypt
incoming PGP encrypted messages.
SESSION KEY
A Session Key is a one-time generated key used with the initial encryption of a
message on your device.
The main function of PGP keys is to make it impossible for anyone to decrypt a
PGP message without knowledge of the contact’s keys. In order to decrypt any
PGP message you must have the contact’s Public Key, Private Key and
passphrase. Considering PGP keys are 4096-bit in size, the chance of decrypting
any message on your device is impossible.
Currently no brute force attack is capable of finding the right keys to decrypt a
PGP message. PGP keys are also used to ensure that only the intended
recipient can receive and decrypt the messages because emails can only be
sent from a contact’s Public Key to its corresponding Private Key
8
THE Phantom Encrypt CORE
UNBREAKABLE MILITARY GRADE ENCRYPTION
Our encryption algorithm is military grade. It has never been cracked, hacked or
broken, operating for more than 10 years without a single breach in security.
The 4096 bit-key end-to-end (device to device) encryption algorithm randomly
generates a unique encryption key (session key) with each communication. This
key is found only on the sender’s device. It is impossible to duplicate and
without it the message is impossible to open or decipher.
All of our secure email addresses are assigned exclusive 4096-bit PGP keys
(public and private). The result is a fully encrypted message that is encrypted
on the device before sending, that stays encrypted during its entire
transmission, and can only be sent to and read by the intended recipient’s
device. There is no known method for compromising our encryption barrier in
existence. It is simply unbreakable.
UNLIMITED INTERNATIONAL ROAMING
In today’s global economy, international business people demand
instant connectivity wherever they travel. Our unlimited international roaming
packages provide instant, automatic connectivity anywhere a 3G-
network signal can be found. Keeping you connected worldwide, at all times,
on the same device.
In critical situations where the success or failure of an opportunity depends on
timely secure communication, our unlimited international roaming feature
makes a world of difference. No need to waste time and money searching for
additional devices or local SIM cards, while your clients or partners wait.
Phantom Encrypt encrypted devices connect instantly to any local 3G-network,
delivering the same uncompromised security anywhere you travel, at no
additional cost.
9
EXCLUSIVE CLOSED-LOOP NETWORK
Because a chain is only as strong as its weakest link, Phantom Encrypt operates
exclusively on a “closed loop” network. This means that individuals who
communicate with inferior encryption services cannot infiltrate the Phantom
Encrypt network of clients. This feature is perhaps the most important of our
core principles. Clients who truly value their privacy and demand peace of mind
settle for nothing less than a closed loop service.
Phantom Encrypt provides a Private Messaging Service unlike any other
because we take the additional steps required to protect our clients, by
eliminating any risk of outside threats.
PRIVATE LOOP NETWORK CONFIGURATION
To further enhance the exclusivity of your closed-loop communications, we are
proud to offer Private Loop Network configuration. Now you can limit your
network to intra-company communications by restricting messaging to your
private circle of contacts. Phantom Encrypt will create a custom domain for the
exclusive use of your company. Rest assured, your private communications will
go no further.
10
PRIVATE OFFSHORE SERVERS
Our private servers are located in offshore regions favorable to anonymous
encrypted communications.
We have strategically built our secure server installations in regions that hold
no treaties with foreign governments; meaning that under law, no foreign body
can disrupt our service or seize our private property. This key asset of the
Phantom Encrypt global infrastructure guarantees our amnesty from potential
foreign threats.
INSTANT DIGITAL SHREDDING
Our servers automatically, digitally shred any trace of your encrypted
communication once it has relayed to the recipient’s device. Unlike a typical
server, which stores an imprint of the communication indefinitely, Phantom
Encrypt servers simply relay the message without decrypting or storing an
imprint.
Our clients can be certain that no trace of any communication they send exists
anywhere beyond what is stored on the sender’s and recipient's devices. Once
those messages have been deleted, they are gone forever.
MULTIPLE SECURE SATELLITE SERVER LOCATIONS
Phantom Encrypt offers a guarantee of uninterrupted service by operating
multiple satellite server locations. While the competition tries to cut costs by
centralizing servers to a single location with the cheapest possible overhead,
we pride ourselves on providing multiple back-ups.
If one of our server locations is damaged or destroyed by sabotage, war or
natural disaster, the rest of the servers immediately fill the gap to ensure that
our clients can always communicate uninterrupted.
Service disruptions are a common complaint we routinely hear from new clients
that have tried working with other providers. We understand that our clients
have a lot on the line, and to suddenly lose communication with their network
of colleagues can be costly, embarrassing and even dangerous. This is simply
not the way to conduct business on an elite level and at Phantom Encrypt, we
hold ourselves to the higher standard for which we are known and trusted.
11
INSTANT REMOTE DATA WIPE
A feature that many of our clients have utilized in high-risk situations is our
Instant Remote Data Wipe service.
If your device or a colleague’s device is lost or should somehow fall into the
wrong hands, simply contact our 24-hour support department to order an
instant remote data wipe. Wherever the device may be, all stored data is
completely wiped, restoring the device to factory settings.
All private information is permanently deleted including messages, notes, files,
contacts, settings, and of course, the PGP encrypted messaging service is
deactivated permanently. This failsafe is another way that Phantom Encrypt
delivers peace of mind.
TOTAL CLIENT ANONYMITY
To ensure your privacy, your purchase is kept completely anonymous. Total
anonymity means that we will never ask our clients for any personal details. We
strongly urge our clients to be weary of any provider that asks for even the
most basic personal details. It is simply not required and totally defeats the
purpose of what encrypted communication is all about.
The idea is to be able communicate securely in total anonymity, not to draw
attention to yourself. At Phantom Encrypt, we have done our due diligence and
continually invest in our global corporate structure to ensure that our company
is not obligated to collect any client details.
Other communication services may not share the same values, have the same
expertise or operate within the same international corporate framework as
Phantom Encrypt. Other services may use your personal information for
purposes undisclosed to you or be forced to reveal your identity.
We do not require any personal information and nor do we maintain any
records of your communications. Put Simply, there is nothing for anyone to
access, including us.
12
PERSONAL ON-THE-GROUND SUPPORT
Our highly trained and knowledgeable agents are located in every main
business hub around the globe. We are never far away when it comes to
keeping you connected with personal on-the-ground support. Your local agent
is always available to meet a new client or support an existing relationship,
because when it comes to securing your communications, delays can be costly.
Our clients have come to trust and demand the premium products and support
that Phantom Encrypt delivers. We’re constantly pushing to raise standards by
carefully selecting only top performing candidates to join our ranks. These strict
hiring practices set us apart from the competition and help secure our position
as the most widely used and trusted provider in the industry worldwide.
At Phantom Encrypt we understand that in the encrypted mobile
telecommunications industry "you get what pay for”. Our clients pay for top-
level privacy protection and we personally deliver a premium service that never
fails.
24-HOUR GLOBAL SUPPORT
24 Hour global technical support protects your business from costly delays.
Should you or anyone in your network experience technical issues with a
device, contact us immediately for around the clock support. We understand
that in highly sensitive business ventures, timing can be pivotal.
When our clients need to communicate securely, they need technical issues
resolved immediately, not the following day during “regular business hours”.
When you pay for premium service, you deserve around the clock support.
13
WHY CHOOSE Phantom Encrypt
Over the years the need for encrypted communication has grown worldwide.
Thousands of top-tier business people have come to trust and rely on the
Phantom Encrypt service to secure their private communications.
Your competitors invest heavily in network security to safeguard their strategy.
They hire specialists to intercept the intel that could reveal your confidential
plans. Social media keeps track of your personal associations and affiliations.
Search engines store your browsing history. It is now common knowledge that
agencies like the NSA can easily listen in on your every phone call, read every
text message and have been monitoring online activity like emails, payments,
downloads and transfers, since 2003.
In today’s electronic age the risks to your personal privacy are greater than
ever. Invasion of privacy and data theft are a common occurrence especially
when it comes to mobile communication. Intrusive agencies want to track your
every word and hackers want to steal your personal data. The competitive
corporate environment is more ruthless than ever and business ethics take a
backseat to turning a profit, behind closed doors.
With standard means of communication you cannot control who has access to
your information and unfortunately, “what you say can and will be used against
you”. Our competitors claim to offer the same level of protection but try to
under-cut the true cost of secure communication. They simply can’t afford, or
refuse to invest in the necessary international infrastructure required to
substantiate their claims. Sadly it is their clients that end up paying the true
price in the end, often with loss of valuable and sensitive private data.
Many important opportunities have been jeopardized or even failed when
private knowledge was leaked to the media and made public. The value of a
first mover advantage is greatly diminished once your competitors are made
privy to the opportunity.
Do you stand to suffer detrimental loss if your private data and
communications were to fall into the wrong hands? If securing your
communications is a priority then don’t settle for anything less than the
guaranteed peace of mind of working with the industry leader in encrypted
mobile communication technologies. Choose Phantom Encrypt today and rest
assured that your private communications can never be viewed by anyone other
than those you choose.
14
BECOME A PARTNER
Partner with Phantom Encrypt and enter the mobile privacy industry.
If you want to run your own business and make a positive impact in the world by
providing a high-value service, then working with Phantom Encrypt is a unique
opportunity consistent with those goals.
Through our Authorized Agent Partnership Program we have achieved
unparalleled success by cultivating independent business operators that
deliver our elite products and service.
Our highly trained and knowledgeable agents are located in every main
business hub around the globe and never too far away when it comes to
keeping our clients connected with personal on the ground support. A local
agent is always available to meet a new client or support an existing
relationship because when it comes to securing communications delays can be
costly.
 Join the cause of protecting private communications and enjoy the
benefits of our international company infrastructure established over 10
years leading the industry
 Build your own business based on trust, pride and value as we have
earned the trust of thousands of our clients by proudly delivering the
highest performing secure global communication solutions.
 Grow as part of our rapidly expanding team of Independent Business
Owners and become the next pioneer of powerful privacy solutions
backed by our 24-hour professional support team.
Achieve Proven Success
Our hard work and dedication have allowed us to reach the top of the industry.
We have set and continually raised the standard for over 10 years. We want you
to join in that tradition of success and help push the envelope even further.
Tap Powerful Resources
15
Our Business Support Department gives you full access to the most effective
tools for building your client base and managing your business operations to
achieve full growth potential. We provide online and personal on the
ground training, marketing materials and signature packaging to ensure that
you’re fully prepared to present a highly professional offering.
Focus On Growth
Focus on achieving rapid and continual growth while we handle the
administrative work. Phantom Encrypt provides our agents with full back-end
support from invoicing to technical support.
If you share our passion for protecting privacy and feel that you possess
qualities consistent with our core values then we would like to position you at
the forefront of the global movement to secure mobile communications.
Becoming part of the Phantom Encrypt global network of agents will allow you
to transform this mission into a highly rewarding career or develop a lucrative
addition to your existing business.
Our clients have come to trust and demand the premium products and support
that Phantom Encrypt delivers. We pride ourselves on constantly pushing to
raise standards by carefully selecting only top performing candidates to join
our ranks. These strict hiring practices set us apart from the competition and
ensure our position as the most widely used and trusted provider in the
industry worldwide. We ensure that everyone one of our agents is well trained
and well compensated because having a highly skilled, motivated team has
always been at the core of our success.
At Phantom Encrypt we understand that in life and in the encrypted mobile
telecommunications sector "you get what pay for”. Our clients pay for top-level
privacy protection and we deliver a premium service that never fails.
16

More Related Content

What's hot

The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internetijtsrd
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatIntellipaat
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attackMark Mair
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. mariotoronto
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacementTELKOMNIKA JOURNAL
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacksApijay Kumar
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 

What's hot (20)

The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internet
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attack
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Cryptography
CryptographyCryptography
Cryptography
 
Spoofing
SpoofingSpoofing
Spoofing
 
A017510102
A017510102A017510102
A017510102
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Security pre
Security preSecurity pre
Security pre
 
2 phishing
2 phishing2 phishing
2 phishing
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 

Viewers also liked

Charles Dickens - Great Expectations
Charles Dickens - Great ExpectationsCharles Dickens - Great Expectations
Charles Dickens - Great ExpectationsGeorge Grayson
 
Module 8.2 lesson 7 sequencing of transformations
Module 8.2 lesson 7 sequencing of transformationsModule 8.2 lesson 7 sequencing of transformations
Module 8.2 lesson 7 sequencing of transformationsErik Tjersland
 
Robert C. Rodgers - Arcadia Snips
Robert C. Rodgers - Arcadia SnipsRobert C. Rodgers - Arcadia Snips
Robert C. Rodgers - Arcadia SnipsGeorge Grayson
 
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...Challenge:Future
 
【セミナー資料】全部見せます!ビズリードの就業規則!
【セミナー資料】全部見せます!ビズリードの就業規則!【セミナー資料】全部見せます!ビズリードの就業規則!
【セミナー資料】全部見せます!ビズリードの就業規則!suemura
 
M7 lesson 1 1 integers part b pdf
M7 lesson 1 1 integers part b pdfM7 lesson 1 1 integers part b pdf
M7 lesson 1 1 integers part b pdflothomas
 
Human origins (Darwin theory,gentic engineering)
Human origins (Darwin theory,gentic engineering)Human origins (Darwin theory,gentic engineering)
Human origins (Darwin theory,gentic engineering)Zeeshan Sajid
 
Publicación The Bioenergy
Publicación The BioenergyPublicación The Bioenergy
Publicación The BioenergyH2O Renovables
 
横浜道場スプリント わくわくルンルン横浜道場 ふりかえり
横浜道場スプリント わくわくルンルン横浜道場 ふりかえり横浜道場スプリント わくわくルンルン横浜道場 ふりかえり
横浜道場スプリント わくわくルンルン横浜道場 ふりかえりAkira Kato
 
Kommunikation i arbetslivet del 2
Kommunikation i arbetslivet del 2Kommunikation i arbetslivet del 2
Kommunikation i arbetslivet del 2jonathansikh
 
Mathematics 9 Lesson 4-C: Joint and Combined Variation
Mathematics 9 Lesson 4-C: Joint and Combined VariationMathematics 9 Lesson 4-C: Joint and Combined Variation
Mathematics 9 Lesson 4-C: Joint and Combined VariationJuan Miguel Palero
 
Module 4.5 lesson 6 scale map
Module 4.5 lesson 6 scale mapModule 4.5 lesson 6 scale map
Module 4.5 lesson 6 scale mapErik Tjersland
 

Viewers also liked (20)

Kretslopp
KretsloppKretslopp
Kretslopp
 
Charles Dickens - Great Expectations
Charles Dickens - Great ExpectationsCharles Dickens - Great Expectations
Charles Dickens - Great Expectations
 
Module 6 lesson 1
Module 6 lesson 1Module 6 lesson 1
Module 6 lesson 1
 
Module 8.2 lesson 7 sequencing of transformations
Module 8.2 lesson 7 sequencing of transformationsModule 8.2 lesson 7 sequencing of transformations
Module 8.2 lesson 7 sequencing of transformations
 
C hi wao_eng_new_c
C hi wao_eng_new_cC hi wao_eng_new_c
C hi wao_eng_new_c
 
Robert C. Rodgers - Arcadia Snips
Robert C. Rodgers - Arcadia SnipsRobert C. Rodgers - Arcadia Snips
Robert C. Rodgers - Arcadia Snips
 
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...
[Challenge:Future] AGRIBUSINESS SOCIALPRENEUR MOVEMENT FOR AGRICULTURE UNDERG...
 
【セミナー資料】全部見せます!ビズリードの就業規則!
【セミナー資料】全部見せます!ビズリードの就業規則!【セミナー資料】全部見せます!ビズリードの就業規則!
【セミナー資料】全部見せます!ビズリードの就業規則!
 
Letter of rec. -Angela
Letter of rec. -AngelaLetter of rec. -Angela
Letter of rec. -Angela
 
cert (19)
cert (19)cert (19)
cert (19)
 
Procedimiento del chipeador
Procedimiento del chipeadorProcedimiento del chipeador
Procedimiento del chipeador
 
Module 3 lesson 14
Module 3 lesson 14Module 3 lesson 14
Module 3 lesson 14
 
M7 lesson 1 1 integers part b pdf
M7 lesson 1 1 integers part b pdfM7 lesson 1 1 integers part b pdf
M7 lesson 1 1 integers part b pdf
 
Human origins (Darwin theory,gentic engineering)
Human origins (Darwin theory,gentic engineering)Human origins (Darwin theory,gentic engineering)
Human origins (Darwin theory,gentic engineering)
 
Unit v mmc
Unit v mmcUnit v mmc
Unit v mmc
 
Publicación The Bioenergy
Publicación The BioenergyPublicación The Bioenergy
Publicación The Bioenergy
 
横浜道場スプリント わくわくルンルン横浜道場 ふりかえり
横浜道場スプリント わくわくルンルン横浜道場 ふりかえり横浜道場スプリント わくわくルンルン横浜道場 ふりかえり
横浜道場スプリント わくわくルンルン横浜道場 ふりかえり
 
Kommunikation i arbetslivet del 2
Kommunikation i arbetslivet del 2Kommunikation i arbetslivet del 2
Kommunikation i arbetslivet del 2
 
Mathematics 9 Lesson 4-C: Joint and Combined Variation
Mathematics 9 Lesson 4-C: Joint and Combined VariationMathematics 9 Lesson 4-C: Joint and Combined Variation
Mathematics 9 Lesson 4-C: Joint and Combined Variation
 
Module 4.5 lesson 6 scale map
Module 4.5 lesson 6 scale mapModule 4.5 lesson 6 scale map
Module 4.5 lesson 6 scale map
 

Similar to Encrypted mobile communications

A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionAlireza Ghahrood
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsRemo Hardeman
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptxjohn6938
 
Domain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxDomain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxInfosectrain3
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfinfosec train
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 

Similar to Encrypted mobile communications (20)

A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Most Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdfMost Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdf
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Domain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxDomain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptx
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 

Recently uploaded

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (7)

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

Encrypted mobile communications

  • 1.
  • 2. WHO WE ARE Protecting civil liberties and the right to secure, private communication for our exclusive network of clients is our core mandate. Our encryption algorithm has never failed, never been cracked and in over 10 years of business we have never disappointed a single client. By continually innovating, while holding firm to our founding principals, we have secured our position as the industry leader. At Phantom Encrypt eliminating the risk of privacy invasion and detrimental data theft is the very core of our business. We pride ourselves on delivering a truly impenetrable barrier of security that ensures our clients’ communications can never be intercepted. Phantom Encrypt is an independent, privately owned company. We have neither affiliation nor obligation to any third party entity. Our only obligation is to our clients. WHAT WE DO We have been delivering military grade mobile encryption solutions on the Blackberry device platform for more than 10 years, without a single breach in security. Phantom Encrypt offers the only proven, time-tested means of communicating securely in total anonymity with PGP encrypted email. Our military grade encryption technology ensures that your private communications stay private and can only be read by your intended recipients. 1
  • 3. YOUR RIGHT TO PRIVACY Protecting civil liberties and the right to secure private communication for our exclusive network of clients is our core mandate. Hackers want to steal your personal and financial details. Competitors conspire to intercept your internal agenda and gain the upper hand. Shady agencies shamelessly violate your constitutional right to privacy, without pretense by monitoring every email, text message and phone call. Phantom Encrypt offers the only proven, time tested means of communicating securely, in total anonymity, with PGP encrypted email on the mobile blackberry device platform.Our military grade encryption technology ensures that your private communications stay private and can only be read by your intended recipients. WHY ENCRYPT YOUR DATA Do you stand to suffer detrimental loss if your private communications or data were to fall into the wrong hands? With cyber crime on the rise, conventional means of communication are not a secure way to transmit sensitive, confidential information and unfortunately, “what you say can and will be used against you”. Large corporations and government agencies spend millions to secure their interests from data theft during transmission. Isn't your confidential information also worth protecting? At Phantom Encrypt eliminating the risk of privacy invasion is the foundation of our business. Safeguard your interests today and enjoy true peace of mind by joining the Phantom Encrypt exclusive network. 2
  • 4. WHY BLACKBERRY ENCRYPTION For more than 15 years BlackBerry has been synonymous with mobile security. Today, threats to mobile security have reached a critical point. Hacker attacks, malware epidemics, multi million-dollar data breaches, or reports of spying appear frequently in the daily news. Today, security and privacy are hot topics for everyone who owns a mobile device. Governments and enterprises need to secure their data to ensure that it doesn’t fall into the wrong hands. High-profile corporate data leaks have caused tremendous damage and drawn attention to the need for secure Enterprise Mobility Management (EMM). Global financial services companies, top law firms, health care providers, law enforcement, defense departments and even the Oval Office trust blackberry to secure their mobile communications. BlackBerry has over 50 security certifications and approvals, more than any other mobile vendor including the only “Full Operational Capability” approval to run on U.S. Department of Defense networks. United States President, Barack Obama told an interviewer that as much as he loves the iPhone, the secret service won’t let him use it because they can't secure it like they can a BlackBerry. Blackberry builds security into every layer of their products, from software and hardware to infrastructure, for a true “end-to-end” security platform. BlackBerry supports a variety of ways to keep your data private, including passwords, two-factor authentication and data encryption. BlackBerry operating systems are compatible with a full range of authentication and encryption solutions, including military grade PGP. New threats are constantly emerging and Blackberry continues to innovate and develop improved security technologies to defend and fortify the privacy of their products. When it comes to true end-to-end security trusted by the world’s most powerful leaders, the choice is simple. 3
  • 5. WHAT IS PGP PGP is a data encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting e-mail communications. Phil Zimmermann created PGP in 1991, while working at PKWARE Inc. This enterprise software company founded in 1986 provides encryption and data compression software used by thousands of organizations. Zimmermann created PGP encryption so that like-minded people could communicate securely without invasion of privacy. Shortly after its release to the public, PGP encryption found its way outside the United States. In February of 1993, Zimmermann became the target of an investigation by the US Government for "munitions export without a license". Cryptosystems using keys larger than 40 bits were then considered munitions within the definition of the US export regulations. PGP has never used keys smaller than 128 bits, so it qualified at that time. Penalties for violation, if found guilty, were substantial. After several years, the investigation of Zimmermann was closed without filing any charges against him or anyone else. Since then PGP has been utilized worldwide by both private and public sector organizations to encrypt sensitive communications in banking, financial services, healthcare and government etc. 4
  • 6. HOW PGP WORKS PGP encrypts messages for the intended recipient using AES-256-bit and 4096- bit PGP keys (Public and Session Keys) on your BlackBerry. When you create a message on your Phantom Encrypt encrypted Blackberry device the following occurs: 1. PGP compresses your plain text email message. Data compression saves transmission time and more importantly strengthens encryption security. Most cryptanalysis techniques exploit patterns and compression reduces these patterns in the plain text, thereby greatly enhancing resistance to cryptanalysis. 2. PGP will then create a random unique one time 4096-bit Session Key. The email message will then get encrypted with the Session Key using AES-256 algorithm creating an encrypted text (cipher text). An encrypted text appears as random numbers, letters, and symbols. For example: simple text such as “hello,” it would appear outside of your device and your intended recipient’s device encrypted as the following: hQIOA68nz9GqU7SREAgAxWfwvpziO4N6KquxmeuYD/txfTceyXRZGVqA GFUGmOdE+K9PCLp/ +p3cFC8OcOZg8WReI4wlpYzgS3/XsB4LL9MegSHwjjI9jNsnQOr9EeLAIgD Eb1NeXZ499qnSY1ZvCy/VCF1O7H71y77VQTckpfyHgWvzka 3. Once the data is encrypted, the Session Key is then encrypted to the recipient's Public Key. PGP combines the encrypted text and encrypted keys into one message before the message is sent from your device creating an “encrypted package” 4. This Public Key encrypted Session Key is transmitted along with the cipher text to the intended recipient (corresponding Private Key). PGP then encrypts the Session Key with the intended recipient’s Public Key. The Public Key is stored with a unique Phantom Email Address you have saved in your address book. All you need to know is who you are contacting and the PGP software handles the rest. 5. After clicking send, your BlackBerry makes a secure AES-256 encrypted connection to the Phantom Encrypt fully encrypted private offshore network. 5
  • 7. 6. Your encrypted message is then sent to Phantom Secure’s offshore network. Your message stays encrypted throughout its entire transmission. Only the intended recipient can receive and decrypt your message. 7. The encrypted message then goes from Phantom Secures offshore network to the recipient’s BlackBerry over the same secure channel. Phantom’s network does not save any information. It is only set up to relay encrypted messages and to monitor any suspicious activities from outsiders. 8. The recipient's copy of PGP uses his or her Private Key and passphrase to recover the temporary Session Key, which PGP then uses to decrypt the cipher text. 9. After the intended recipient receives the encrypted package, he or she can decrypt the message “hello” by using his or her unique Private Key (found only on the recipient’s device) and passphrase. A message can only be sent from an email’s Public Key to its corresponding Private Key. HOW STRONG IS PGP ENCRYPTION The real strength of PGP is found in its key, which is measured in bits. Phantom Encrypt PGP encryption utilizes keys that are 4096-bit in size. The size of a key is directly related to the strength of the encryption as it is the only way you can decrypt a message (by having the email’s Public Key, Private Key, and passphrase). To give you an idea of the size of a key, the following is an example of what is considered today as the minimum size key required for an encryption algorithm to be secure. A 1024-bit key is a 308-digit number that looks similar to the following: 10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00 0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, 000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0 00,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00 0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, 000,000,000,000,000,000,000,000,000,000,000. 6
  • 8. With Phantom Encrypt, your private keys are generated as a combination of numbers, letters, and symbols that is one of 2/4096 possibilities. The probability of finding your key in this pool of possibilities is impossible. If this sounds confusing imagine the number above as having not 308 but 1234 digits. It is difficult for the common person to grasp how this seemingly infinite number relates to encryption strength but the proof lays in the simple fact that no one and no combination of super computers has ever been able to find or recreate the correct keys that are assigned to an encrypted email. This is the strength of PGP encryption technology that has been tried and tested for more than three decades. It is simply unbreakable. YOUR Phantom Encrypt PGP ENCRYPTED EMAIL ADDRESS Our client’s will receive an exclusive email address. The email address on the device will have two unique-4096 bit PGP keys associated with it. The first being the Public Key (shared) and the second being the Private Key, which is found only on the device WHAT IS A PASSPHRASE A passphrase is a longer version of a password. A passphrase is more secure against standard dictionary attacks because even if a hacker tries all the words in the dictionary in an attempt to determine your passphrase, he or she will not be able to crack it. The best passphrases are relatively long and complex and contain a combination of uppercase and lowercase letters, numbers, and punctuation characters. PGP uses a passphrase to encrypt your private key on your BlackBerry device. 7
  • 9. PGP KEYS There are three types of 4096-bit keys used in PGP – Public, Private, and Session. Public and Private Keys are unique for the Phantom Email Address on our device. PGP keys are generated using special encryption algorithms by the PGP software. PUBLIC KEY A Public Key is one of two keys on a Phantom PGP email. It acts like a lock on the encrypted message you create for a person, which can be opened by its Private Key that resides only on the intended recipient’s BlackBerry. As the name indicates, this key can be shared with others, which acts like a direct line only to you. PRIVATE KEY A Private Key is one of two keys on a Phantom PGP email. This key is found only on your BlackBerry device. This key along with the passphrase can decrypt incoming PGP encrypted messages. SESSION KEY A Session Key is a one-time generated key used with the initial encryption of a message on your device. The main function of PGP keys is to make it impossible for anyone to decrypt a PGP message without knowledge of the contact’s keys. In order to decrypt any PGP message you must have the contact’s Public Key, Private Key and passphrase. Considering PGP keys are 4096-bit in size, the chance of decrypting any message on your device is impossible. Currently no brute force attack is capable of finding the right keys to decrypt a PGP message. PGP keys are also used to ensure that only the intended recipient can receive and decrypt the messages because emails can only be sent from a contact’s Public Key to its corresponding Private Key 8
  • 10. THE Phantom Encrypt CORE UNBREAKABLE MILITARY GRADE ENCRYPTION Our encryption algorithm is military grade. It has never been cracked, hacked or broken, operating for more than 10 years without a single breach in security. The 4096 bit-key end-to-end (device to device) encryption algorithm randomly generates a unique encryption key (session key) with each communication. This key is found only on the sender’s device. It is impossible to duplicate and without it the message is impossible to open or decipher. All of our secure email addresses are assigned exclusive 4096-bit PGP keys (public and private). The result is a fully encrypted message that is encrypted on the device before sending, that stays encrypted during its entire transmission, and can only be sent to and read by the intended recipient’s device. There is no known method for compromising our encryption barrier in existence. It is simply unbreakable. UNLIMITED INTERNATIONAL ROAMING In today’s global economy, international business people demand instant connectivity wherever they travel. Our unlimited international roaming packages provide instant, automatic connectivity anywhere a 3G- network signal can be found. Keeping you connected worldwide, at all times, on the same device. In critical situations where the success or failure of an opportunity depends on timely secure communication, our unlimited international roaming feature makes a world of difference. No need to waste time and money searching for additional devices or local SIM cards, while your clients or partners wait. Phantom Encrypt encrypted devices connect instantly to any local 3G-network, delivering the same uncompromised security anywhere you travel, at no additional cost. 9
  • 11. EXCLUSIVE CLOSED-LOOP NETWORK Because a chain is only as strong as its weakest link, Phantom Encrypt operates exclusively on a “closed loop” network. This means that individuals who communicate with inferior encryption services cannot infiltrate the Phantom Encrypt network of clients. This feature is perhaps the most important of our core principles. Clients who truly value their privacy and demand peace of mind settle for nothing less than a closed loop service. Phantom Encrypt provides a Private Messaging Service unlike any other because we take the additional steps required to protect our clients, by eliminating any risk of outside threats. PRIVATE LOOP NETWORK CONFIGURATION To further enhance the exclusivity of your closed-loop communications, we are proud to offer Private Loop Network configuration. Now you can limit your network to intra-company communications by restricting messaging to your private circle of contacts. Phantom Encrypt will create a custom domain for the exclusive use of your company. Rest assured, your private communications will go no further. 10
  • 12. PRIVATE OFFSHORE SERVERS Our private servers are located in offshore regions favorable to anonymous encrypted communications. We have strategically built our secure server installations in regions that hold no treaties with foreign governments; meaning that under law, no foreign body can disrupt our service or seize our private property. This key asset of the Phantom Encrypt global infrastructure guarantees our amnesty from potential foreign threats. INSTANT DIGITAL SHREDDING Our servers automatically, digitally shred any trace of your encrypted communication once it has relayed to the recipient’s device. Unlike a typical server, which stores an imprint of the communication indefinitely, Phantom Encrypt servers simply relay the message without decrypting or storing an imprint. Our clients can be certain that no trace of any communication they send exists anywhere beyond what is stored on the sender’s and recipient's devices. Once those messages have been deleted, they are gone forever. MULTIPLE SECURE SATELLITE SERVER LOCATIONS Phantom Encrypt offers a guarantee of uninterrupted service by operating multiple satellite server locations. While the competition tries to cut costs by centralizing servers to a single location with the cheapest possible overhead, we pride ourselves on providing multiple back-ups. If one of our server locations is damaged or destroyed by sabotage, war or natural disaster, the rest of the servers immediately fill the gap to ensure that our clients can always communicate uninterrupted. Service disruptions are a common complaint we routinely hear from new clients that have tried working with other providers. We understand that our clients have a lot on the line, and to suddenly lose communication with their network of colleagues can be costly, embarrassing and even dangerous. This is simply not the way to conduct business on an elite level and at Phantom Encrypt, we hold ourselves to the higher standard for which we are known and trusted. 11
  • 13. INSTANT REMOTE DATA WIPE A feature that many of our clients have utilized in high-risk situations is our Instant Remote Data Wipe service. If your device or a colleague’s device is lost or should somehow fall into the wrong hands, simply contact our 24-hour support department to order an instant remote data wipe. Wherever the device may be, all stored data is completely wiped, restoring the device to factory settings. All private information is permanently deleted including messages, notes, files, contacts, settings, and of course, the PGP encrypted messaging service is deactivated permanently. This failsafe is another way that Phantom Encrypt delivers peace of mind. TOTAL CLIENT ANONYMITY To ensure your privacy, your purchase is kept completely anonymous. Total anonymity means that we will never ask our clients for any personal details. We strongly urge our clients to be weary of any provider that asks for even the most basic personal details. It is simply not required and totally defeats the purpose of what encrypted communication is all about. The idea is to be able communicate securely in total anonymity, not to draw attention to yourself. At Phantom Encrypt, we have done our due diligence and continually invest in our global corporate structure to ensure that our company is not obligated to collect any client details. Other communication services may not share the same values, have the same expertise or operate within the same international corporate framework as Phantom Encrypt. Other services may use your personal information for purposes undisclosed to you or be forced to reveal your identity. We do not require any personal information and nor do we maintain any records of your communications. Put Simply, there is nothing for anyone to access, including us. 12
  • 14. PERSONAL ON-THE-GROUND SUPPORT Our highly trained and knowledgeable agents are located in every main business hub around the globe. We are never far away when it comes to keeping you connected with personal on-the-ground support. Your local agent is always available to meet a new client or support an existing relationship, because when it comes to securing your communications, delays can be costly. Our clients have come to trust and demand the premium products and support that Phantom Encrypt delivers. We’re constantly pushing to raise standards by carefully selecting only top performing candidates to join our ranks. These strict hiring practices set us apart from the competition and help secure our position as the most widely used and trusted provider in the industry worldwide. At Phantom Encrypt we understand that in the encrypted mobile telecommunications industry "you get what pay for”. Our clients pay for top- level privacy protection and we personally deliver a premium service that never fails. 24-HOUR GLOBAL SUPPORT 24 Hour global technical support protects your business from costly delays. Should you or anyone in your network experience technical issues with a device, contact us immediately for around the clock support. We understand that in highly sensitive business ventures, timing can be pivotal. When our clients need to communicate securely, they need technical issues resolved immediately, not the following day during “regular business hours”. When you pay for premium service, you deserve around the clock support. 13
  • 15. WHY CHOOSE Phantom Encrypt Over the years the need for encrypted communication has grown worldwide. Thousands of top-tier business people have come to trust and rely on the Phantom Encrypt service to secure their private communications. Your competitors invest heavily in network security to safeguard their strategy. They hire specialists to intercept the intel that could reveal your confidential plans. Social media keeps track of your personal associations and affiliations. Search engines store your browsing history. It is now common knowledge that agencies like the NSA can easily listen in on your every phone call, read every text message and have been monitoring online activity like emails, payments, downloads and transfers, since 2003. In today’s electronic age the risks to your personal privacy are greater than ever. Invasion of privacy and data theft are a common occurrence especially when it comes to mobile communication. Intrusive agencies want to track your every word and hackers want to steal your personal data. The competitive corporate environment is more ruthless than ever and business ethics take a backseat to turning a profit, behind closed doors. With standard means of communication you cannot control who has access to your information and unfortunately, “what you say can and will be used against you”. Our competitors claim to offer the same level of protection but try to under-cut the true cost of secure communication. They simply can’t afford, or refuse to invest in the necessary international infrastructure required to substantiate their claims. Sadly it is their clients that end up paying the true price in the end, often with loss of valuable and sensitive private data. Many important opportunities have been jeopardized or even failed when private knowledge was leaked to the media and made public. The value of a first mover advantage is greatly diminished once your competitors are made privy to the opportunity. Do you stand to suffer detrimental loss if your private data and communications were to fall into the wrong hands? If securing your communications is a priority then don’t settle for anything less than the guaranteed peace of mind of working with the industry leader in encrypted mobile communication technologies. Choose Phantom Encrypt today and rest assured that your private communications can never be viewed by anyone other than those you choose. 14
  • 16. BECOME A PARTNER Partner with Phantom Encrypt and enter the mobile privacy industry. If you want to run your own business and make a positive impact in the world by providing a high-value service, then working with Phantom Encrypt is a unique opportunity consistent with those goals. Through our Authorized Agent Partnership Program we have achieved unparalleled success by cultivating independent business operators that deliver our elite products and service. Our highly trained and knowledgeable agents are located in every main business hub around the globe and never too far away when it comes to keeping our clients connected with personal on the ground support. A local agent is always available to meet a new client or support an existing relationship because when it comes to securing communications delays can be costly.  Join the cause of protecting private communications and enjoy the benefits of our international company infrastructure established over 10 years leading the industry  Build your own business based on trust, pride and value as we have earned the trust of thousands of our clients by proudly delivering the highest performing secure global communication solutions.  Grow as part of our rapidly expanding team of Independent Business Owners and become the next pioneer of powerful privacy solutions backed by our 24-hour professional support team. Achieve Proven Success Our hard work and dedication have allowed us to reach the top of the industry. We have set and continually raised the standard for over 10 years. We want you to join in that tradition of success and help push the envelope even further. Tap Powerful Resources 15
  • 17. Our Business Support Department gives you full access to the most effective tools for building your client base and managing your business operations to achieve full growth potential. We provide online and personal on the ground training, marketing materials and signature packaging to ensure that you’re fully prepared to present a highly professional offering. Focus On Growth Focus on achieving rapid and continual growth while we handle the administrative work. Phantom Encrypt provides our agents with full back-end support from invoicing to technical support. If you share our passion for protecting privacy and feel that you possess qualities consistent with our core values then we would like to position you at the forefront of the global movement to secure mobile communications. Becoming part of the Phantom Encrypt global network of agents will allow you to transform this mission into a highly rewarding career or develop a lucrative addition to your existing business. Our clients have come to trust and demand the premium products and support that Phantom Encrypt delivers. We pride ourselves on constantly pushing to raise standards by carefully selecting only top performing candidates to join our ranks. These strict hiring practices set us apart from the competition and ensure our position as the most widely used and trusted provider in the industry worldwide. We ensure that everyone one of our agents is well trained and well compensated because having a highly skilled, motivated team has always been at the core of our success. At Phantom Encrypt we understand that in life and in the encrypted mobile telecommunications sector "you get what pay for”. Our clients pay for top-level privacy protection and we deliver a premium service that never fails. 16