parallax background

How does it work?

Cypherdog Messenger application allows text communication between users of mobile devices.

If the text messages you send and store require absolute confidentiality, try Cypherdog Messenger. Our software is easy to use while maintaining the highest message security level.

The text messaging functionality also applies to our File Exchange & Storage solution. In addition, this license also allows you to use Cypherdog Messenger on a mobile device. Find out more about File Exchange & Storage here.

Threats in cyberspace

Most instant messaging services are vulnerable to cyberattacks, resulting in unwanted access and disclosure of confidential information.

In addition, cyberattacks often result in identity theft where cyber criminals use sophisticated cyberattack tactics to acquire the identity of the user. Popular tools leave a digital trace of your actions, collect logs and metadata and often, based on data, profile users for marketing purposes.

Cypherdog is a comprehensive solution to both threats. On the one hand, it ensures message encryption (hiding its content from unauthorized users). On the other, it allows the recipient to confirm the sender's identity.

What does our messenger provide?

  • text messages are asymmetrically encrypted and transferred via the servers' RAM,
  • messages disappear 24 hours after transmission, without leaving any trace,
  • the application allows you to confirm the identity of other users during a face-to-face meeting,
  • information in your address book is available only to you. You also do not leave your metadata when communicating and transferring files (anonymized data),
  • your cryptographic keys never leave your device and, in the event of their loss, you can recover them from a USB backup or printout on paper, and
  • your cryptographic keys can be transferred from one device to another if you use multiple devices.

Arrivals user interface

Cypherdog Messenger software focuses on simplicity and ease of use. During installation, the program will ask for the password of your private key which you must remember and will allow you to make a copy of it to a USB drive or to print a copy of the key on a piece of paper.

After installation, you need to create an address book of other Cypherdog Messenger users by inviting them from the application. After accepting the invitation, you can send text messages.

parallax background
 

Technical specification

Cypherdog works as an Android or iOS mobile application.
You can download it from Google Play or Apple Store.


parallax background

Private key protection

The security of Cypherdog customers' data is based on the confidentiality of their private keys. Each user's private key is generated only by the Cypherdog application using the RSA algorithm and is encrypted with the customer’s password. An essential principle implemented by all system components is the principle of the absolute protection of the private key. This key or any part of it never leaves the user's device. It is the only way to ensure data confidentiality in the system.

Cypherdog uses cryptographics methods based on a combination of asymmetric and symmetric algorithms: RSA3072, SHA256 and AES-256.

Confidentiality and integrity

This solution has many advantages, among others, absolute confidentiality and integrity of stored and transmitted information. However, there is one limitation to keep in mind, if the user loses her private key, she will not be able to recover her data.

The master system does not offer any private key recovery function. To protect data against loss, the user should use the Cypherdog application to make a copy of her private key to a portable disk or print its representation in a QR code and keep a copy of the key safe (in the Business version private keys are stored on the organization's server in Vault).

Options for making a copy of the key are available in the desktop application and can be made after registration in the system. All cryptographic data generated during the information lifecycle is derived from the private key owned by the user. Therefore, the strength of the private key is uncompromised to avoid computational attacks aimed at its reproduction.

parallax background

Private key protection

The security of Cypherdog customers' data is based on the confidentiality of their private keys. Each user's private key is generated only by the Cypherdog application using the RSA algorithm and is encrypted with the customer’s password. An essential principle implemented by all system components is the principle of the absolute protection of the private key. This key or any part of it never leaves the user's device. It is the only way to ensure data confidentiality in the system.

Cypherdog uses cryptographic methods based on a combination of asymmetric and symmetric algorithms: RSA3072, SHA256 and AES-256.

Confidentiality and integrity

This solution has many advantages, among others, absolute confidentiality and integrity of stored and transmitted information. However, there is one limitation to keep in mind, if the user loses her private key, she will not be able to recover her data.

The master system does not offer any private key recovery function. To protect data against loss, the user should use the Cypherdog application to make a copy of her private key to a portable disk or print its representation in a QR code and keep a copy of the key safe (in the Business version private keys are stored on the organization's server in Vault).

Options for making a copy of the key are available in the desktop application and can be made after registration in the system. All cryptographic data generated during the information lifecycle is derived from the private key owned by the user. Therefore, the strength of the private key is uncompromised to avoid computational attacks aimed at its reproduction.

Pricing



The best product for your business

30$ / year


Download Buy

parallax background
parallax background

Do you have any questions?


Make an appointment with our VP of Sales - Przemysław Kucharzewski


Book consultation

Do you have any questions?


Make an appointment with our VP of Sales - Przemysław Kucharzewski


Book consultation