You are on page 1of 17

WHO WE ARE

Protecting civil liberties and the right to secure, private communication for our
exclusive network of clients is our core mandate.
Our encryption algorithm has never failed, never been cracked and in over 10
years of business we have never disappointed a single client. By continually
innovating, while holding firm to our founding principals, we have secured our
position as the industry leader.
At Phantom Encrypt eliminating the risk of privacy invasion and detrimental
data theft is the very core of our business. We pride ourselves on delivering a
truly impenetrable barrier of security that ensures our clients communications
can never be intercepted.
Phantom Encrypt is an independent, privately owned company. We have neither
affiliation nor obligation to any third party entity. Our only obligation is to our
clients.
WHAT WE DO
We have been delivering military grade mobile encryption solutions on the
Blackberry device platform for more than 10 years, without a single breach in
security.
Phantom Encrypt offers the only proven, time-tested means of communicating
securely in total anonymity with PGP encrypted email. Our military grade
encryption technology ensures that your private communications stay private
and can only be read by your intended recipients.

YOUR RIGHT TO PRIVACY


Protecting civil liberties and the right to secure private communication for our
exclusive network of clients is our core mandate.
Hackers want to steal your personal and financial details. Competitors conspire
to intercept your internal agenda and gain the upper hand. Shady agencies
shamelessly violate your constitutional right to privacy, without pretense by
monitoring every email, text message and phone call.
Phantom Encrypt offers the only proven, time tested means of communicating
securely, in total anonymity, with PGP encrypted email on the mobile blackberry
device platform.Our military grade encryption technology ensures that your
private communications stay private and can only be read by your intended
recipients.
WHY ENCRYPT YOUR DATA
Do you stand to suffer detrimental loss if your private communications or data
were to fall into the wrong hands?
With cyber crime on the rise, conventional means of communication are not a
secure way to transmit sensitive, confidential information and unfortunately,
what you say can and will be used against you.
Large corporations and government agencies spend millions to secure their
interests from data theft during transmission. Isn't your confidential
information also worth protecting?
At Phantom Encrypt eliminating the risk of privacy invasion is the foundation of
our business. Safeguard your interests today and enjoy true peace of mind by
joining the Phantom Encrypt exclusive network.

WHY BLACKBERRY ENCRYPTION


For more than 15 years BlackBerry has been synonymous with mobile security.
Today, threats to mobile security have reached a critical point. Hacker attacks,
malware epidemics, multi million-dollar data breaches, or reports of spying
appear frequently in the daily news.
Today, security and privacy are hot topics for everyone who owns a mobile
device. Governments and enterprises need to secure their data to ensure that
it doesnt fall into the wrong hands. High-profile corporate data leaks have
caused tremendous damage and drawn attention to the need for secure
Enterprise Mobility Management (EMM).
Global financial services companies, top law firms, health care providers, law
enforcement, defense departments and even the Oval Office trust blackberry
to secure their mobile communications.
BlackBerry has over 50 security certifications and approvals, more than any
other mobile vendor including the only Full Operational Capability approval
to run on U.S. Department of Defense networks.
United States President, Barack Obama told an interviewer that as much as he
loves the iPhone, the secret service wont let him use it because they can't
secure it like they can a BlackBerry.
Blackberry builds security into every layer of their products, from software and
hardware to infrastructure, for a true end-to-end security platform.
BlackBerry supports a variety of ways to keep your data private, including
passwords, two-factor authentication and data encryption.
BlackBerry operating systems are compatible with a full range of
authentication and encryption solutions, including military grade PGP.
New threats are constantly emerging and Blackberry continues to innovate and
develop improved security technologies to defend and fortify the privacy of
their products.
When it comes to true end-to-end security trusted by the worlds most
powerful leaders, the choice is simple.

WHAT IS PGP
PGP is a data encryption program that provides cryptographic privacy and
authentication for data communication. PGP is used for signing, encrypting,
and decrypting e-mail communications.
Phil Zimmermann created PGP in 1991, while working at
PKWARE Inc. This enterprise software company founded in
1986 provides encryption and data compression software used
by thousands of organizations.
Zimmermann created PGP encryption so that like-minded
people could communicate securely without invasion of
privacy.
Shortly after its release to the public, PGP encryption found its way outside the
United States. In February of 1993, Zimmermann became the target of an
investigation by the US Government for "munitions export without a license".
Cryptosystems using keys larger than 40 bits were then considered munitions
within the definition of the US export regulations. PGP has never used keys
smaller than 128 bits, so it qualified at that time.
Penalties for violation, if found guilty, were substantial. After several years, the
investigation of Zimmermann was closed without filing any charges against him
or anyone else.
Since then PGP has been utilized worldwide by both private and public sector
organizations to encrypt sensitive communications in banking, financial
services, healthcare and government etc.

HOW PGP WORKS


PGP encrypts messages for the intended recipient using AES-256-bit and 4096bit PGP keys (Public and Session Keys) on your BlackBerry.
When you create a message on your Phantom Encrypt encrypted Blackberry
device the following occurs:
1. PGP compresses your plain text email message. Data compression saves
transmission time and more importantly strengthens encryption
security. Most cryptanalysis techniques exploit patterns and
compression reduces these patterns in the plain text, thereby greatly
enhancing resistance to cryptanalysis.
2. PGP will then create a random unique one time 4096-bit Session Key.
The email message will then get encrypted with the Session Key using
AES-256 algorithm creating an encrypted text (cipher text). An
encrypted text appears as random numbers, letters, and symbols.
For example: simple text such as hello, it would appear outside of your
device and your intended recipients device encrypted as the following:
hQIOA68nz9GqU7SREAgAxWfwvpziO4N6KquxmeuYD/txfTceyXRZGVqA
GFUGmOdE+K9PCLp/
+p3cFC8OcOZg8WReI4wlpYzgS3/XsB4LL9MegSHwjjI9jNsnQOr9EeLAIgD
Eb1NeXZ499qnSY1ZvCy/VCF1O7H71y77VQTckpfyHgWvzka
3. Once the data is encrypted, the Session Key is then encrypted to the
recipient's Public Key. PGP combines the encrypted text and encrypted
keys into one message before the message is sent from your device
creating an encrypted package
4. This Public Key encrypted Session Key is transmitted along with the
cipher text to the intended recipient (corresponding Private Key). PGP
then encrypts the Session Key with the intended recipients Public Key.
The Public Key is stored with a unique Phantom Email Address you have
saved in your address book. All you need to know is who you are
contacting and the PGP software handles the rest.
5. After clicking send, your BlackBerry makes a secure AES-256 encrypted
connection to the Phantom Encrypt fully encrypted private offshore
network.

6. Your encrypted message is then sent to Phantom Secures offshore


network. Your message stays encrypted throughout its entire
transmission. Only the intended recipient can receive and decrypt your
message.
7. The encrypted message then goes from Phantom Secures offshore
network to the recipients BlackBerry over the same secure channel.
Phantoms network does not save any information. It is only set up to
relay encrypted messages and to monitor any suspicious activities from
outsiders.
8. The recipient's copy of PGP uses his or her Private Key and passphrase to
recover the temporary Session Key, which PGP then uses to decrypt the
cipher text.
9. After the intended recipient receives the encrypted package, he or she
can decrypt the message hello by using his or her unique Private Key
(found only on the recipients device) and passphrase. A message can
only be sent from an emails Public Key to its corresponding Private Key.
HOW STRONG IS PGP ENCRYPTION
The real strength of PGP is found in its key, which is measured in bits. Phantom
Encrypt PGP encryption utilizes keys that are 4096-bit in size.
The size of a key is directly related to the strength of the encryption as it is the
only way you can decrypt a message (by having the emails Public Key, Private
Key, and passphrase).
To give you an idea of the size of a key, the following is an example of what is
considered today as the minimum size key required for an encryption algorithm
to be secure.
A 1024-bit key is a 308-digit number that looks similar to the following:
10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00
0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0
00,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,00
0,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000.

With Phantom Encrypt, your private keys are generated as a combination of


numbers, letters, and symbols that is one of 2/4096 possibilities. The probability
of finding your key in this pool of possibilities is impossible. If this sounds
confusing imagine the number above as having not 308 but 1234 digits. It is
difficult for the common person to grasp how this seemingly infinite number
relates to encryption strength but the proof lays in the simple fact that no one
and no combination of super computers has ever been able to find or recreate
the correct keys that are assigned to an encrypted email. This is the strength of
PGP encryption technology that has been tried and tested for more than three
decades. It is simply unbreakable.
YOUR Phantom Encrypt PGP ENCRYPTED EMAIL ADDRESS
Our clients will receive an exclusive email address. The email address on the
device will have two unique-4096 bit PGP keys associated with it. The first
being the Public Key (shared) and the second being the Private Key, which is
found only on the device
WHAT IS A PASSPHRASE
A passphrase is a longer version of a password. A passphrase is more secure
against standard dictionary attacks because even if a hacker tries all the words
in the dictionary in an attempt to determine your passphrase, he or she will not
be able to crack it. The best passphrases are relatively long and complex and
contain a combination of uppercase and lowercase letters, numbers, and
punctuation characters. PGP uses a passphrase to encrypt your private key on
your BlackBerry device.

PGP KEYS
There are three types of 4096-bit keys used in PGP Public, Private, and
Session. Public and Private Keys are unique for the Phantom Email Address on
our device. PGP keys are generated using special encryption algorithms by the
PGP software.
PUBLIC KEY
A Public Key is one of two keys on a Phantom PGP email. It acts like a lock on
the encrypted message you create for a person, which can be opened by its
Private Key that resides only on the intended recipients BlackBerry. As the
name indicates, this key can be shared with others, which acts like a direct line
only to you.
PRIVATE KEY
A Private Key is one of two keys on a Phantom PGP email. This key is found only
on your BlackBerry device. This key along with the passphrase can decrypt
incoming PGP encrypted messages.
SESSION KEY
A Session Key is a one-time generated key used with the initial encryption of a
message on your device.
The main function of PGP keys is to make it impossible for anyone to decrypt a
PGP message without knowledge of the contacts keys. In order to decrypt any
PGP message you must have the contacts Public Key, Private Key and
passphrase. Considering PGP keys are 4096-bit in size, the chance of decrypting
any message on your device is impossible.
Currently no brute force attack is capable of finding the right keys to decrypt a
PGP message. PGP keys are also used to ensure that only the intended
recipient can receive and decrypt the messages because emails can only be
sent from a contacts Public Key to its corresponding Private Key

THE Phantom Encrypt CORE


UNBREAKABLE MILITARY GRADE ENCRYPTION
Our encryption algorithm is military grade. It has never been cracked, hacked or
broken, operating for more than 10 years without a single breach in security.
The 4096 bit-key end-to-end (device to device) encryption algorithm randomly
generates a unique encryption key (session key) with each communication. This
key is found only on the senders device. It is impossible to duplicate and
without it the message is impossible to open or decipher.
All of our secure email addresses are assigned exclusive 4096-bit PGP keys
(public and private). The result is a fully encrypted message that is encrypted
on the device before sending, that stays encrypted during its entire
transmission, and can only be sent to and read by the intended recipients
device. There is no known method for compromising our encryption barrier in
existence. It is simply unbreakable.
UNLIMITED INTERNATIONAL ROAMING
In todays global economy, international business people demand
instant connectivity wherever they travel. Our unlimited international roaming
packages provide instant, automatic connectivity anywhere a 3Gnetwork signal can be found. Keeping you connected worldwide, at all times,
on the same device.
In critical situations where the success or failure of an opportunity depends on
timely secure communication, our unlimited international roaming feature
makes a world of difference. No need to waste time and money searching for
additional devices or local SIM cards, while your clients or partners wait.
Phantom Encrypt encrypted devices connect instantly to any local 3G-network,
delivering the same uncompromised security anywhere you travel, at no
additional cost.

EXCLUSIVE CLOSED-LOOP NETWORK


Because a chain is only as strong as its weakest link, Phantom Encrypt operates
exclusively on a closed loop network. This means that individuals who
communicate with inferior encryption services cannot infiltrate the Phantom
Encrypt network of clients. This feature is perhaps the most important of our
core principles. Clients who truly value their privacy and demand peace of mind
settle for nothing less than a closed loop service.
Phantom Encrypt provides a Private Messaging Service unlike any other
because we take the additional steps required to protect our clients, by
eliminating any risk of outside threats.
PRIVATE LOOP NETWORK CONFIGURATION
To further enhance the exclusivity of your closed-loop communications, we are
proud to offer Private Loop Network configuration. Now you can limit your
network to intra-company communications by restricting messaging to your
private circle of contacts. Phantom Encrypt will create a custom domain for the
exclusive use of your company. Rest assured, your private communications will
go no further.

10

PRIVATE OFFSHORE SERVERS


Our private servers are located in offshore regions favorable to anonymous
encrypted communications.
We have strategically built our secure server installations in regions that hold
no treaties with foreign governments; meaning that under law, no foreign body
can disrupt our service or seize our private property. This key asset of the
Phantom Encrypt global infrastructure guarantees our amnesty from potential
foreign threats.
INSTANT DIGITAL SHREDDING
Our servers automatically, digitally shred any trace of your encrypted
communication once it has relayed to the recipients device. Unlike a typical
server, which stores an imprint of the communication indefinitely, Phantom
Encrypt servers simply relay the message without decrypting or storing an
imprint.
Our clients can be certain that no trace of any communication they send exists
anywhere beyond what is stored on the senders and recipient's devices. Once
those messages have been deleted, they are gone forever.
MULTIPLE SECURE SATELLITE SERVER LOCATIONS
Phantom Encrypt offers a guarantee of uninterrupted service by operating
multiple satellite server locations. While the competition tries to cut costs by
centralizing servers to a single location with the cheapest possible overhead,
we pride ourselves on providing multiple back-ups.
If one of our server locations is damaged or destroyed by sabotage, war or
natural disaster, the rest of the servers immediately fill the gap to ensure that
our clients can always communicate uninterrupted.
Service disruptions are a common complaint we routinely hear from new clients
that have tried working with other providers. We understand that our clients
have a lot on the line, and to suddenly lose communication with their network
of colleagues can be costly, embarrassing and even dangerous. This is simply
not the way to conduct business on an elite level and at Phantom Encrypt, we
hold ourselves to the higher standard for which we are known and trusted.

11

INSTANT REMOTE DATA WIPE


A feature that many of our clients have utilized in high-risk situations is our
Instant Remote Data Wipe service.
If your device or a colleagues device is lost or should somehow fall into the
wrong hands, simply contact our 24-hour support department to order an
instant remote data wipe. Wherever the device may be, all stored data is
completely wiped, restoring the device to factory settings.
All private information is permanently deleted including messages, notes, files,
contacts, settings, and of course, the PGP encrypted messaging service is
deactivated permanently. This failsafe is another way that Phantom Encrypt
delivers peace of mind.
TOTAL CLIENT ANONYMITY
To ensure your privacy, your purchase is kept completely anonymous. Total
anonymity means that we will never ask our clients for any personal details. We
strongly urge our clients to be weary of any provider that asks for even the
most basic personal details. It is simply not required and totally defeats the
purpose of what encrypted communication is all about.
The idea is to be able communicate securely in total anonymity, not to draw
attention to yourself. At Phantom Encrypt, we have done our due diligence and
continually invest in our global corporate structure to ensure that our company
is not obligated to collect any client details.
Other communication services may not share the same values, have the same
expertise or operate within the same international corporate framework as
Phantom Encrypt. Other services may use your personal information for
purposes undisclosed to you or be forced to reveal your identity.
We do not require any personal information and nor do we maintain any
records of your communications. Put Simply, there is nothing for anyone to
access, including us.

12

PERSONAL ON-THE-GROUND SUPPORT


Our highly trained and knowledgeable agents are located in every main
business hub around the globe. We are never far away when it comes to
keeping you connected with personal on-the-ground support. Your local agent
is always available to meet a new client or support an existing relationship,
because when it comes to securing your communications, delays can be costly.
Our clients have come to trust and demand the premium products and support
that Phantom Encrypt delivers. Were constantly pushing to raise standards by
carefully selecting only top performing candidates to join our ranks. These strict
hiring practices set us apart from the competition and help secure our position
as the most widely used and trusted provider in the industry worldwide.
At Phantom Encrypt we understand that in the encrypted mobile
telecommunications industry "you get what pay for. Our clients pay for toplevel privacy protection and we personally deliver a premium service that never
fails.
24-HOUR GLOBAL SUPPORT
24 Hour global technical support protects your business from costly delays.
Should you or anyone in your network experience technical issues with a
device, contact us immediately for around the clock support. We understand
that in highly sensitive business ventures, timing can be pivotal.
When our clients need to communicate securely, they need technical issues
resolved immediately, not the following day during regular business hours.
When you pay for premium service, you deserve around the clock support.

13

WHY CHOOSE Phantom Encrypt


Over the years the need for encrypted communication has grown worldwide.
Thousands of top-tier business people have come to trust and rely on the
Phantom Encrypt service to secure their private communications.
Your competitors invest heavily in network security to safeguard their strategy.
They hire specialists to intercept the intel that could reveal your confidential
plans. Social media keeps track of your personal associations and affiliations.
Search engines store your browsing history. It is now common knowledge that
agencies like the NSA can easily listen in on your every phone call, read every
text message and have been monitoring online activity like emails, payments,
downloads and transfers, since 2003.
In todays electronic age the risks to your personal privacy are greater than
ever. Invasion of privacy and data theft are a common occurrence especially
when it comes to mobile communication. Intrusive agencies want to track your
every word and hackers want to steal your personal data. The competitive
corporate environment is more ruthless than ever and business ethics take a
backseat to turning a profit, behind closed doors.
With standard means of communication you cannot control who has access to
your information and unfortunately, what you say can and will be used against
you. Our competitors claim to offer the same level of protection but try to
under-cut the true cost of secure communication. They simply cant afford, or
refuse to invest in the necessary international infrastructure required to
substantiate their claims. Sadly it is their clients that end up paying the true
price in the end, often with loss of valuable and sensitive private data.
Many important opportunities have been jeopardized or even failed when
private knowledge was leaked to the media and made public. The value of a
first mover advantage is greatly diminished once your competitors are made
privy to the opportunity.
Do you stand to suffer detrimental loss if your private data and
communications were to fall into the wrong hands? If securing your
communications is a priority then dont settle for anything less than the
guaranteed peace of mind of working with the industry leader in encrypted
mobile communication technologies. Choose Phantom Encrypt today and rest
assured that your private communications can never be viewed by anyone other
than those you choose.

14

BECOME A PARTNER
Partner with Phantom Encrypt and enter the mobile privacy industry.
If you want to run your own business and make a positive impact in the world by
providing a high-value service, then working with Phantom Encrypt is a unique
opportunity consistent with those goals.
Through our Authorized Agent Partnership Program we have achieved
unparalleled success by cultivating independent business operators that
deliver our elite products and service.
Our highly trained and knowledgeable agents are located in every main
business hub around the globe and never too far away when it comes to
keeping our clients connected with personal on the ground support. A local
agent is always available to meet a new client or support an existing
relationship because when it comes to securing communications delays can be
costly.

Join the cause of protecting private communications and enjoy the


benefits of our international company infrastructure established over 10
years leading the industry

Build your own business based on trust, pride and value as we have
earned the trust of thousands of our clients by proudly delivering the
highest performing secure global communication solutions.

Grow as part of our rapidly expanding team of Independent Business


Owners and become the next pioneer of powerful privacy solutions
backed by our 24-hour professional support team.

Achieve Proven Success


Our hard work and dedication have allowed us to reach the top of the industry.
We have set and continually raised the standard for over 10 years. We want you
to join in that tradition of success and help push the envelope even further.
Tap Powerful Resources

15

Our Business Support Department gives you full access to the most effective
tools for building your client base and managing your business operations to
achieve full growth potential. We provide online and personal on the
ground training, marketing materials and signature packaging to ensure that
youre fully prepared to present a highly professional offering.
Focus On Growth
Focus on achieving rapid and continual growth while we handle the
administrative work. Phantom Encrypt provides our agents with full back-end
support from invoicing to technical support.
If you share our passion for protecting privacy and feel that you possess
qualities consistent with our core values then we would like to position you at
the forefront of the global movement to secure mobile communications.
Becoming part of the Phantom Encrypt global network of agents will allow you
to transform this mission into a highly rewarding career or develop a lucrative
addition to your existing business.
Our clients have come to trust and demand the premium products and support
that Phantom Encrypt delivers. We pride ourselves on constantly pushing to
raise standards by carefully selecting only top performing candidates to join
our ranks. These strict hiring practices set us apart from the competition and
ensure our position as the most widely used and trusted provider in the
industry worldwide. We ensure that everyone one of our agents is well trained
and well compensated because having a highly skilled, motivated team has
always been at the core of our success.
At Phantom Encrypt we understand that in life and in the encrypted mobile
telecommunications sector "you get what pay for. Our clients pay for top-level
privacy protection and we deliver a premium service that never fails.

16

You might also like