The technology behind Ciphr
There is nothing that CIPHR has or knows that can be effectively used to decrypt user generated messages and content.
User controlled keys
Private keys are generated by the user and never leave the device.
Users control who has access to sent messages and for how long.
No data touches CIPHR servers in an unencrypted format.
Advanced protocols and cryptographic schemes ensure that the information security properties of the service will hold true even against the cryptanalytic attacks enabled by quantum computers.
Improvements upon the well established Axolotl protocol, provide first class information security properties even in a post-quantum scenario.
The award-winning Argon2 hash provides resistance to offline, brute-force attacks against any user data-at-rest on endpoint devices and CIPHR servers.
CIPHR servers are accessible only by VPN, and leverage a strict TLS configuration and pinned certificates. By doing so, we protect against attacks such as Heartbleed or BEAST, and the compromise of certificate authorities.