Absolute control over your private information. All Cipher Contact data (id,keys,contacts) are encrypted at all times.
Ability to create your unique personal encryption system that is beyond military and security agencies decryption capabilities. Cipher Contact rules out the suspicion of hacking or content disclosure.
* The underlying encryption does not use or relates to any known encryption systems. Fundamentals of the encryption model could be found at arXiv ( http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyone to verify its security by auditing the cryptosystem
* Based on user credentials (Id, Key) a dynamically unique cryptosystem is configured. The new cryptosystem is part of a virtually infinite family of cryptosystems and gives no information regarding its underlying algebraic structure and key space
* For any Key length, the brute force is impossible on sequential machines
* To brute force a slight Key length <= 13 there are necessary 2^92 parallel machines (which is approximately the number of atoms in the human body). The same number of parallel machines is not sufficient to brute force a Key length > 13.
You are allowed to use this product only within the laws of your country/region. SharewareOnSale and its staff are not responsible for any illegal activity. We did not develop this product; if you have an issue with this product, contact the developer. This product is offered "as is" without express or implied or any other type of warranty. The description of this product on this page is not a recommendation, endorsement, or review; it is a marketing description, written by the developer. The quality and performance of this product is without guarantee. Download or use at your own risk. If you don't feel comfortable with this product, then don't download it.