The technology behind Ciphr

No Backdoor

There is nothing that CIPHR has or knows that can be effectively used to decrypt user generated messages and content.

User controlled keys

Private keys are generated by the user and never leave the device.

Ephemeral messages

Users control who has access to sent messages and for how long.

Peer-to-peer

No data touches CIPHR servers in an unencrypted format.

PQ-ECC

Advanced protocols and cryptographic schemes ensure that the information security properties of the service will hold true even against the cryptanalytic attacks enabled by quantum computers.

Advanced Axolotl

Improvements upon the well established Axolotl protocol, provide first class information security properties even in a post-quantum scenario.

Argon2

The award-winning Argon2 hash provides resistance to offline, brute-force attacks against any user data-at-rest on endpoint devices and CIPHR servers.

Secure Endpoints

CIPHR servers are accessible only by VPN, and leverage a strict TLS configuration and pinned certificates. By doing so, we protect against attacks such as Heartbleed or BEAST, and the compromise of certificate authorities.

WANT TO BE PART OF THE EXPERIENCE?