CyberWar Anti Espionage Data Defense Systems
Transform any Android Device into a
Mobile Encryption Machine
Let us know your secrecy needs in terms of cyber defense of top classified communications and data transfers.
We are here to help you achieve total secrecy.
Consult with us for Free on :
WhatsApp/Telegram/Signal
+37257347873​
agents@DigitalBankVault.com
No login info for entering the platform, there is not username and password.
The User needs to enter a "Secret Passphrase"
This Passphrase is not a password ! This passphrase is not registered anywhere.
The passphrase inserted, along with our encryption algorithms creates on the spot 4 different encryption keys that will be used for encrypting the data, with 4 different symmetric encryption systems, in 4 consecutive times, it means each file is encrypted 4 times, with 4 different encryption keys, and 4 different encryption systems.
The Passphrase is creating your encryption keys for the current session, and each time you change it will change the encryption keys, this passphrase can can changed on a constant basis, as much as you want.
Remember the passphrase because you will need it , the moment you want to decipher the encrypted file.
The + sign below the passphrase windows allows multiple people to participate in the encryption of the data, what is called "Multi Signature" scenario , where two or more user encrypt the same data, while no one knows the passphrase of the other person and for then decrypting the joint encrypted file, both of them will have to insert their own secret phrase.
TOTAL ABSENCE of Key Management Needs :
Key management refers to management of cryptographic keys in a cryptosystem.
This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. There is not need for all the above mentioned.
NO NEED to get keys securely to thousands of crypto boxes in the field, perhaps the most challenging part of any encryption system. No Need for technology for distributing keys in a way that the humans never have access to plaintext key.
​
Based on what is called " Pre Shared" Secret between two communicating parties.
​
​
The Passphrase can be written in any language with any letters or symbols.
When Encrypting Data to be stored it is important to memorize the passphrase otherwise the data encrypted cannot be deciphered, there is no backup, anywhere .
When sending an encrypted file to a third party, upon its arrival, in order for them to decipher the data, they will need the same exact encryption system ( same version as yours) , and they will need to insert the same passphrase, this is called "Pre Shared Secret".
You now entered the main dashboard, and you can choose between encrypting or decrypting
Any type of file can be encrypted, in addition you can encrypt instantly text messages, videos and audio messages taken on the spot
Trial Version for Android >
Download link
Contact us on
WhatsApp/Signal/Telegram
+37257347873
Email:
Info@DigitalBankVault.com
Let's start with text encryption:
You type the text message, click encrypt and the encrypted message shows up, you can opt to copy the encrypted text, paste it and send it ( for example on an email) or you can scan, take a picture, copy, save or share the QR code generated, that actually is the actual encrypted text message.
The advantage of the QR code is that the transfer of the encrypted data , out of the Cipher Machine is done visually ( by scanning) , without any physical connection needed, what is called "Pure Air Gapped" Transfer
Perfect Secrecy (or information-theoretic secure) means that the ciphertext conveys no information about the content of the plaintext. In effect this means that, no matter how much ciphertext you have, it does not convey anything about what the plaintext and key were.
When used correctly, the One Time Pad (OTP) is information-theoretic secure, which means it can't be broken with cryptanalysis.
When the text is encrypted, you have a few options :
1. Take a picture of the QR code (that contains the encrypted text) with an online connected device for then sending this QR code, online, to the receiver.
The QR code can be securely sent online, by any means, because it cannot be deciphered.
2. Second Option is to save this QR code on the encryption device itself and to have it on file, when needed later on to be deciphered.
3. Another option is to just copy the encrypted text and paste it on an email , or messengers like WhatsApp, Telegram, Signal, this in case you want to connect the offline device to the internet for a few seconds , just to send out the encrypted text.
There
Sending an Ultra Encrypted Message to a third party, online, without ever actually sending him anything directly, meaning that no direct digital trace is left.
SAFER THAN A FACE TO FACE MEETING
The sender encrypt a text message on his Offline Cipher Machine, scan the QR code with his internet connected device and share the QR code on an anonymous account on any social media. Then the receiver just needs to reach that post and scan the QR code shared with his Offline Cipher Machine and read the plain text message.
In order for the receiver to be able to decipher the QR code, he needs to use the same passphrase used by the sender and of course work with the same encryption system version of the sender.
PREVENTING:
Traffic flow security
​
Making sure an adversary cannot obtain information from traffic analysis.
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted.
TWO PARTIES COMMUNICATING IN A FULLY ENCRYPTED WAY, TOTALLY OFFLINE
WITHOUT LEAVING ANY DIGITAL TRACE ONLINE
​
Encrypted Email Scenario:
You can take a picture with your online connected cellphone, of the QR code, attach this image to an email ands send it out to the receiver. He then open the email on his smartphone and scan the QR code received with his offline encryption system and read the decrypted text .
Never trust any encrypted email providers, the moment they are the ones creating the encryption keys , manage them and store them for you, it's game over.
In this way , if you encrypt the content of your email and send it out encrypted , nobody will ever be able to decipher the content sent , besides the designated receiver.
​
​
Offline Encrypted Communications Modus Operandi
Imagine this “covert communications” scenario:
Bob wants to send Alice an extremely confidential text message.
Bob is encrypting the message on his Mobile Encryption Machine.
​
The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .
This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Twitter account that is then visited by Alice, who owns the same Offline Cipher Machine .
Alice then scan the QR code from the Twitter post ( or any other social media or cloud storage service) and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.
​
Attention:
​
No direct encrypted messages ever sent to the “receiver”,just posted online in an ultra encrypted form, on anonymous social media accounts , by the sender, to be then scanned and deciphered by the receiver.
Encryption and Decryption happens totally offline .
The Offline Cipher Machines never get connected even physically(by cables) to the online device for transferring encrypted data!
The sender and receiver pre shared their daily pass phrase in order to create on the spot the encryption/decryption keys.Pure OTP Cipher.
Encryption Keys are never stored anywhere or exchanged with the communicating party.Encryption Keys are crated on spot by the user and then permanently erased from the cipher machine.
SuperEncryption Methodology where 4 different encryption keys are created and each data is encrypted 4 consecutive times, with 4 different encryption algorithms, creating a 4 layered encrypted file that becomes mathematically uncrackable, no matter how much computational power is applied.
Each client gets his own , unique, personal set of encryption algorithms, creating like that a closed network of dedicated cipher machines for each organization or company.No two companies use the same encryption system.
​
IMAGE INSTEAD OF A QR CODE
There are cases in which sending an encrypted text or QR code, may attract unnecessary attention , like communicating with CEOs while they travel in non democratic countries where they can be spied or constantly under digital surveillance.
In those cases the user can encrypt a text message and the encrypted file is generated in the form on an image , looking like a normal pic or an ad, and send this out or post it online on some social media , instead of the QR code. Then the receiver will scan this image as he does with the QR code and decipher the text securely on his offline machine.
In
The Cipher System Can Be Used for:
1) Quantum Safe Data Storage Solution: data encrypted can be securely stored on any cloud, online storage, servers, and all online or cellular connected devices.
2) Offline Communications : Private, Unique Encryption System and Encrypted Network, with a dedicated set of encryption algorithms for Ultra Encrypted Covert Communications and Secure Online Files Transfers.
​