Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Protecting civil liberties and the right to secure, private communication for our
exclusive network of clients is our core mandate.
Our encryption algorithm has never failed, never been cracked and in over 10
years of business we have never disappointed a single client. By continually
innovating, while holding firm to our founding principals, we have secured our
position as the industry leader.
At Phantom Encrypt eliminating the risk of privacy invasion and detrimental
data theft is the very core of our business. We pride ourselves on delivering a
truly impenetrable barrier of security that ensures our clients communications
can never be intercepted.
Phantom Encrypt is an independent, privately owned company. We have neither
affiliation nor obligation to any third party entity. Our only obligation is to our
clients.
WHAT WE DO
We have been delivering military grade mobile encryption solutions on the
Blackberry device platform for more than 10 years, without a single breach in
security.
Phantom Encrypt offers the only proven, time-tested means of communicating
securely in total anonymity with PGP encrypted email. Our military grade
encryption technology ensures that your private communications stay private
and can only be read by your intended recipients.
WHAT IS PGP
PGP is a data encryption program that provides cryptographic privacy and
authentication for data communication. PGP is used for signing, encrypting,
and decrypting e-mail communications.
Phil Zimmermann created PGP in 1991, while working at
PKWARE Inc. This enterprise software company founded in
1986 provides encryption and data compression software used
by thousands of organizations.
Zimmermann created PGP encryption so that like-minded
people could communicate securely without invasion of
privacy.
Shortly after its release to the public, PGP encryption found its way outside the
United States. In February of 1993, Zimmermann became the target of an
investigation by the US Government for "munitions export without a license".
Cryptosystems using keys larger than 40 bits were then considered munitions
within the definition of the US export regulations. PGP has never used keys
smaller than 128 bits, so it qualified at that time.
Penalties for violation, if found guilty, were substantial. After several years, the
investigation of Zimmermann was closed without filing any charges against him
or anyone else.
Since then PGP has been utilized worldwide by both private and public sector
organizations to encrypt sensitive communications in banking, financial
services, healthcare and government etc.
PGP KEYS
There are three types of 4096-bit keys used in PGP Public, Private, and
Session. Public and Private Keys are unique for the Phantom Email Address on
our device. PGP keys are generated using special encryption algorithms by the
PGP software.
PUBLIC KEY
A Public Key is one of two keys on a Phantom PGP email. It acts like a lock on
the encrypted message you create for a person, which can be opened by its
Private Key that resides only on the intended recipients BlackBerry. As the
name indicates, this key can be shared with others, which acts like a direct line
only to you.
PRIVATE KEY
A Private Key is one of two keys on a Phantom PGP email. This key is found only
on your BlackBerry device. This key along with the passphrase can decrypt
incoming PGP encrypted messages.
SESSION KEY
A Session Key is a one-time generated key used with the initial encryption of a
message on your device.
The main function of PGP keys is to make it impossible for anyone to decrypt a
PGP message without knowledge of the contacts keys. In order to decrypt any
PGP message you must have the contacts Public Key, Private Key and
passphrase. Considering PGP keys are 4096-bit in size, the chance of decrypting
any message on your device is impossible.
Currently no brute force attack is capable of finding the right keys to decrypt a
PGP message. PGP keys are also used to ensure that only the intended
recipient can receive and decrypt the messages because emails can only be
sent from a contacts Public Key to its corresponding Private Key
10
11
12
13
14
BECOME A PARTNER
Partner with Phantom Encrypt and enter the mobile privacy industry.
If you want to run your own business and make a positive impact in the world by
providing a high-value service, then working with Phantom Encrypt is a unique
opportunity consistent with those goals.
Through our Authorized Agent Partnership Program we have achieved
unparalleled success by cultivating independent business operators that
deliver our elite products and service.
Our highly trained and knowledgeable agents are located in every main
business hub around the globe and never too far away when it comes to
keeping our clients connected with personal on the ground support. A local
agent is always available to meet a new client or support an existing
relationship because when it comes to securing communications delays can be
costly.
Build your own business based on trust, pride and value as we have
earned the trust of thousands of our clients by proudly delivering the
highest performing secure global communication solutions.
15
Our Business Support Department gives you full access to the most effective
tools for building your client base and managing your business operations to
achieve full growth potential. We provide online and personal on the
ground training, marketing materials and signature packaging to ensure that
youre fully prepared to present a highly professional offering.
Focus On Growth
Focus on achieving rapid and continual growth while we handle the
administrative work. Phantom Encrypt provides our agents with full back-end
support from invoicing to technical support.
If you share our passion for protecting privacy and feel that you possess
qualities consistent with our core values then we would like to position you at
the forefront of the global movement to secure mobile communications.
Becoming part of the Phantom Encrypt global network of agents will allow you
to transform this mission into a highly rewarding career or develop a lucrative
addition to your existing business.
Our clients have come to trust and demand the premium products and support
that Phantom Encrypt delivers. We pride ourselves on constantly pushing to
raise standards by carefully selecting only top performing candidates to join
our ranks. These strict hiring practices set us apart from the competition and
ensure our position as the most widely used and trusted provider in the
industry worldwide. We ensure that everyone one of our agents is well trained
and well compensated because having a highly skilled, motivated team has
always been at the core of our success.
At Phantom Encrypt we understand that in life and in the encrypted mobile
telecommunications sector "you get what pay for. Our clients pay for top-level
privacy protection and we deliver a premium service that never fails.
16