- Frequently asked questions about Kryptophone;

- Frequently asked questions about Kryptomobile;

- Frequently asked questions about Kryptocomputer;

- Frequently asked questions about Kryptovpn;

- Frequently asked questions about Security.



Kryptophone

What is Kryptophone?

KryptoPhone is a land line ciphered telephone service with an anti tapping/interception system. KryptoPhone uses the Internet connection of your service provider to set up an encrypted connection through which the encrypted phone call is transmitted. Calls, through the encryption process, are encrypted in a way that makes it impossible for anyone and any tapping tool to access them.


Do I have to change telephone provider to use the Kryptophone?

No you don't. KryptoPhone does not interfere with the standard telephone line but uses an Internet connection. Simply connect your Kryptophone to your ADSL router or Internet connection to dial and receive encrypted calls.


Can I be traced if I use the Kryptophone?

KryptoPhone uses your Internet connection to set up an encrypted data channel, it enables the encrypted calls to pass through its own ciphered servers using the Internet connection. This means that there is no connection between the calls that go through Kryptotel's Network and the calls that go through the normal public switches. In addition, the calls that go through Kryptotel's encrypted network are not stored in order to provide absolute anonymity.


Is the KryptoPhone difficult to use?
KryptoPhone is easy to use and does not require any additional configuration. You'll receive a preconfigured KryptoPhone with a personal telephone number that will already be active and ready to use. Once you connect your phone to your Internet connection a couple of minutes will be required to initialize the phone, then a green phone icon will appear on the display. At this point you will be able to digit the phone number of a Kryptotel correspondent and speak immediately with a secure encrypted connection.

How much do KryptoPhone calls cost?
Calls have no additional cost. You can use the service for FREE for both National and International calls.

What is the difference between KryptoPhone and other solutions on the market?
Kryptotel has the following strengths that sets it apart from other solutions on the market:

*issues/enables a personal Kryptotel number that is not used on traditional phone lines so it is not correlated to any phone users.
*it is the only solution that uses a redundant and separate encryption, one inside the other, with different algorithms in the same application (3 levels for Kryptophone)
*uses the best security encryption algorithms based on the highest international standards (asymmetric and symmetric key algorithms)

Is it legal to use a Kryptophone line?
Encryption techniques for phone calls, e-mails, or data on a personal computer are NOT prohibited by any law or regulation most part of the world. For sure Europe,Usa and most others countries allow to use encryption.

Therefore the use of any of Kryptotel's solutions is perfectly legal: you have the right to protect your privacy, your business and your image, and these are prerequisites to living safely.

Can I install KryptoPhone without having a telephone connection?
YES, KryptoPhone uses an Internet connection and not the ordinary telephone line.


How can I be certain that my conversations are not being recorded by you?
All technical infrastructure, equipment and software used by Kryptotel involve the use of the most advanced and reliable encryption algorithms. Each service is designed in detail and its management is carried out in compliance with the International ISO-27001 norm.
Click here for details and remember that "Your Privacy is our Mission!".

-How can I be sure that the calls through Kryptotel cannot be intercepted?

Kryptotel uses SRTP and TLS standard protocols respectively to encrypt the audio channel and the signal channel (information on the caller and called);


- What does standard protocol mean?

It means that they have been labelled as standards by the IETF (Internet Engineering Task Force), entity that defines all the communication protocols used on the Internet therefore are pre-examined by tens of thousand of studious in the world. The fact that they are standard and “open -source” is a reliability and security guarantee.


- Mmmmm, given for granted that the SRTP and TLS communication protocols are safe, how can I be sure that Kryptotel uses them effectively?


Kryptotel has just recently decided to NOT use its own programs or telephones but applications and voip telephones that are compatible with the above protocols, all manufactured by third parties. The configuration process of the mentioned applications and voip telephones foresees specific indication of the encryption of Voice with SRTP and the use of TLS encryption for the Signal. Basically the applications and the proper functionality of the these protocols on the infrastructure are guaranteed by extremely important software and hardware manufacturers that have no direct relationship with Kryptotel.


-How can I be sure I configured the Voip client correctly?

The Voip clients that we suggest to install display a clear real time message that indicates when the the call is encrypted. Furthermore, in order to completely avoid configuration errors, Kryptotel's servers do not accept calls that are not encrypted.


- Sorry but by nature I am totally distrustful and I have doubts that you have secretly made arrangements with the manufacturers of the telephones and the applications that you suggest on your website. Can I choose to use different telephones and Voip applications but still compatible with TLS and SRTP ?

Of course, many applications and telephones are compatible and many more that will support these protocols will be available in the future. Even if they are not mentioned they are very easy to configure with the few parameters requested by Kryptotel's servers.


If I to still have doubts on the reliability of SRTP and TLS how can I find out more?

Great documents are available online:

SRTP:

Wikipedia: http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol

Ietf: http://www.ietf.org/rfc/rfc3711.txt

Snom: http://wiki.snom.com/Category:HowTo:SRTP


TLS:

Wikipedia: http://en.wikipedia.org/wiki/Transport_Layer_Security

Ietf: http://tools.ietf.org/html/rfc5246


KryptoMobile

What is KryptoMobile?

KryptoMobile is a mobile ciphered service with an anti tapping/interception system. KryptoMobile uses the Internet connection of your service provider (WiFi or 3G) to set up an encrypted connection through which the encrypted phone call is transmitted. Calls, through the encryption process, are encrypted in a way that makes it impossible for anyone and any tapping tool to access them.


Do I have to change telephone provider to use KryptoMobile??

No you don't. KryptoMobile does not interfere with standard GSM telephone line but uses an Internet connection (GSM data channel or WiFi connection). All you need is a WiFi or 3G Internet connection with adequate Internet band width.


Can I be traced if I use KryptoMobile?

No you can't! KryptoMobile uses your Internet connection to set up an encrypted data channel, it enables the encrypted calls to pass through its own ciphered servers using the Internet connection. This means that there is no connection between the calls that go through Kryptotel's Network and the calls that go through the normal public switches. In addition, the calls that go through Kryptotel's encrypted network are not stored in order to provide absolute anonymity.


Is KryptoMobile difficult to use?
KryptoMobile is easy to use and does not require any additional configuration. You will receive a pre configured KryptoMobile (or you can follow the instructions to download and configure the application by yourself on your own Iphone) with a personal telephone number that will be already active. Once your mobile phone is turned on it will be ready to use. You can open the Softphone Application and at this point you will be able to digit the phone number of a Kryptotel correspondent and speak immediately with a secure encrypted connection.

How much do KryptoMobile calls cost?
Calls have no additional cost. You can use the service for FREE for both National and International calls.


What is the difference between KryptoMobile and other solutions on the market?
KryptoMobile has the following strengths that set it apart from other solutions on the market:

*issues a personal Kryptotel number that is not used on traditional phone lines so it is not correlated it to any phone users.
*it is the only solution that uses a redundant and separate encryption, one inside the other, with different algorithms in the same application (2 levels for KryptoMobile)
*uses the best security encryption algorithms based on the highest international standards (asymmetric and symmetric key algorithms)

Is it legal to use a KryptoMobile line?
Encryption techniques for phone calls, e-mail or data on a personal computer are NOT prohibited by any law or regulation in the world.

Therefore the use of any of Kryptotel's solutions is perfectly legal: you have the right to protect your privacy, your business and your image, and these are prerequisites to living safe.

Can I use KryptoMobile without having a SIM card with an active voice profile?
YES, KryptoMobile uses an Internet connection (WiFi/3G) and not the ordinary GSM channel.


How can I be certain that my conversations are not recorded by you?
All technical infrastructure, equipment and software used by Kryptotel involve the use of the most advanced and reliable encryption algorithms. Each service is designed in detail and its management is carried out in compliance with the International ISO-27001 norm.
Click here for details and remember that "Your Privacy is our Mission!".

-How can I be sure that the calls through Kryptotel cannot be intercepted?

Kryptotel uses SRTP and TLS standard protocols respectively to encrypt the audio channel and the signal channel (information on the caller and called);


- What does standard protocol mean?

It means that they have been labelled as standards by the IETF (Internet Engineering Task Force), entity that defines all the communication protocols used on the Internet therefore are pre-examined by tens of thousand of studious in the world. The fact that they are standard and “open -source” is a reliability and security guarantee.


- Mmmmm, given for granted that the SRTP and TLS communication protocols are safe, how can I be sure that Kryptotel uses them effectively?


Kryptotel has just recently decided to NOT use its own programs or telephones but applications and voip telephones that are compatible with the above protocols, all manufactured by third parties. The configuration process of the mentioned applications and voip telephones foresees specific indication of the encryption of Voice with SRTP and the use of TLS encryption for the Signal. Basically the applications and the proper functionality of the these protocols on the infrastructure are guaranteed by extremely important software and hardware manufacturers that have no direct relationship with Kryptotel.


-How can I be sure I configured the Voip client correctly?

The Voip clients that we suggest to install display a clear real time message that indicates when the the call is encrypted. Furthermore, in order to completely avoid configuration errors, Kryptotel's servers do not accept calls that are not encrypted.


- Sorry but by nature I am totally distrustful and I have doubts that you have secretly made arrangements with the manufacturers of the telephones and the applications that you suggest on your website. Can I choose to use different telephones and Voip applications but still compatible with TLS and SRTP ?

Of course, many applications and telephones are compatible and many more that will support these protocols will be available in the future. Even if they are not mentioned they are very easy to configure with the few parameters requested by Kryptotel's servers.


If I to still have doubts on the reliability of SRTP and TLS how can I find out more?

Great documents are available online:

SRTP:

Wikipedia: http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol

Ietf: http://www.ietf.org/rfc/rfc3711.txt

Snom: http://wiki.snom.com/Category:HowTo:SRTP


TLS:

Wikipedia: http://en.wikipedia.org/wiki/Transport_Layer_Security

Ietf: http://tools.ietf.org/html/rfc5246


KryptoComputer

If I lose my KryptoComputer password is there a way to recover the stored data?

No, it's impossible to retrieve data without having the encryption password. If you lose or you don't remember your password: say goodbye to your data!!



If I cannot renew my subscription, is it possible to continue using KryptoComputer without encrypted e-mails?

Yes, the KryptoComputer can be used forever as an encrypted computer but without encrypted e-mails.



Can I use my encrypted e-mail account with people who do not have this feature on their computer?

Yes, you can send and receive non encrypted e-mails to people outside of Kryptotel's network but you are not completely safe from tapping/interception.




Kryptovpn

What is a VPN?

We can describe it as a data channel that is established between a client and a server. The server is responsible for connecting to the Internet so the client (PC) doesn’t connect to the Internet with a local IP address assigned by the ISP. The VPN IP address is assigned from the VPN remote server.

Why should I use a VPN?


The Use of a VPN is not required but definitely recommended. Nowadays with the massive use of Internet, the complexity and the numerous legislative controls, it is recommended to hide behind a gateway that does not allow data or geographical identification of your PC


If I use the VPN service, what problems could I have?

None at all, the use of VPN service is allowed in any Country.


What is the difference between the KryptoVPN and a standard VPN?

The KryptoVPN besides ensuring anonymity on the Internet is able to establish an encrypted connection to the VPN server. KryptoVPN is safe from any attempt of interception because the encryption is performed with AES256 bit symmetric key one of the most reliable in terms of safety.


Does KryptoVPN give me always the same IP?

Kryptotel has servers allocated in five Continents and client connections to the servers are random and the encryption keys change randomly.


Can I use peer-to peer programs?(e-mule, Torrent, ecc)

Sure, KryptoVPN allows you to share files with others without the risk of being identified. The highest security!!


I want to use programs like Facebook and Skype, but in my Country something is blocking access to these services

No problem, you can connect anonymously to the network with KryptoVPN and use the IM services, live chat, social networks. All the sites that have been blocked by the network administrator will become available without any risk of being traced.


Will there be a slowdown in browsing speed when using the KryptoVPN?

The slowdown is very very small, almost un noticeable.


Are there traffic limits with KryptoVPN?

You can surf for as long as you like without any charge!


Is it hard to configure KryptoVPN?

No, it’s easy and fast. Just visit Kryptotel's e-commerce page and start the download, after purchasing the certificates required for activation.


How much does KryptoVPN cost?

KryptoVpn costs only 3.95$ per month with unlimited traffic and no activation fees. A small price for maximum safety! Kryptotel offers several purchasing options and you can also buy anonymously


How to start KryptoVPN?

Once you have purchased KryptoVPN you will get a confirmation e-mail with the activation certificates and encryption key required to establish a secure connection with KryptoVPN servers. At this point, follow available guide step by step here.




Security

How can Kryptotel ensure data security?
Kryptotel's technical infrastructure is completely encrypted and dislocated in three similar infrastructures located in Panama, Singapore and Hong Kong. In these Countries there is NO LAW on data or communication revealing. This means that in NO circumstance will Kryptotel be in the position to have to reveal data about its customers or data about the calls. Furthermore local and foreign Authorities cannot investigate about Kryptotel's customers. For more details you can click here.

Can I use my trusted technicians to verify Kryptotel's technical infrastructure?

Yes as a further guarantee of Kryptotel's service reliability it's possible to verify every single detail of Kryptotel's infrastructure and software source code.


Is Kryptotel's solution fully owned?

Many developed components are owned, but security is based on public encryption algorithms that are considered inviolable (AES, SSL, Twofish, Serpent, RSA, TLS, SRTP). Source codes are available to be examined and certified by third parties.


-How can I be sure that the calls through Kryptotel cannot be intercepted?

Kryptotel uses SRTP and TLS standard protocols respectively to encrypt the audio channel and the signal channel (information on the caller and called);


- What does standard protocol mean?

It means that they have been labelled as standards by the IETF (Internet Engineering Task Force), entity that defines all the communication protocols used on the Internet therefore are pre-examined by tens of thousand of studious in the world. The fact that they are standard and “open -source” is a reliability and security guarantee.


- Mmmmm, given for granted that the SRTP and TLS communication protocols are safe, how can I be sure that Kryptotel uses them effectively?


Kryptotel has just recently decided to NOT use its own programs or telephones but applications and voip telephones that are compatible with the above protocols, all manufactured by third parties. The configuration process of the mentioned applications and voip telephones foresees specific indication of the encryption of Voice with SRTP and the use of TLS encryption for the Signal. Basically the applications and the proper functionality of the these protocols on the infrastructure are guaranteed by extremely important software and hardware manufacturers that have no direct relationship with Kryptotel.


-How can I be sure I configured the Voip client correctly?

The Voip clients that we suggest to install display a clear real time message that indicates when the the call is encrypted. Furthermore, in order to completely avoid configuration errors, Kryptotel's servers do not accept calls that are not encrypted.


- Sorry but by nature I am totally distrustful and I have doubts that you have secretly made arrangements with the manufacturers of the telephones and the applications that you suggest on your website. Can I choose to use different telephones and Voip applications but still compatible with TLS and SRTP ?

Of course, many applications and telephones are compatible and many more that will support these protocols will be available in the future. Even if they are not mentioned they are very easy to configure with the few parameters requested by Kryptotel's servers.


If I to still have doubts on the reliability of SRTP and TLS how can I find out more?

Great documents are available online:

SRTP:

Wikipedia: http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol

Ietf: http://www.ietf.org/rfc/rfc3711.txt

Snom: http://wiki.snom.com/Category:HowTo:SRTP


TLS:

Wikipedia: http://en.wikipedia.org/wiki/Transport_Layer_Security

Ietf: http://tools.ietf.org/html/rfc5246


Your Privacy is our Mission!