How do I install and set up Kryptos?
Watch Kryptos installation and set up video by clicking here
How concerned should I be about protecting my voice communications?
It's so easy to intercept cellular and other digital communications that even teenagers can do it. But it's not teenagers that represent the worst threat. Corporate espionage, terrorist activities and kidnapping for ransom are just a few of the risks you face when your business and personal conversations are open to anyone who cares to listen.
Kryptos utilizes military grade 256-bit AES encryption for voice communications, how secure is 256-bit AES?
AES is FIPS (Federal Information Processing Standard) certified and there are currently no known non-brute-force direct attacks against AES (except some side channel timing attacks on the processing of AES that are not feasible over a network environment). In fact, AES security is strong enough to be certified for use by the US government for top secret information. The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. 2048-bit RSA encryption is utilized for the session key exchange.
Are there any geographic or export restrictions for Kryptos?
Yes. Kryptos may NOT be sold or used in any of the following territories: Kryptos is prohibited for export or re-export to Cuba, Iran, Sudan, North Korea, Syria, or any other country that is subject to U.S. economic sanctions or comprehensive export controls restricting such export or re-export, as well as to persons or entities barred from engaging in export transactions by the U.S. Departments of Commerce, State or Treasury, as well as to any person or entity which will use them for end-uses proscribed by U.S. export regulations (see Kryptos Terms of Service for further information).
Does the person I am calling need to have Kryptos installed for a secure, encrypted conversation?
Yes. Kryptos works as a peer-to-peer (end-to-end) encryption solution, so Kryptos must be installed on both sides of the call. Both parties must have Kryptos to initiate a call session which will enable complete military grade 256-bit AES encryption during the conversation call session. 2048-bit RSA encryption is utilized for the session key exchange.
Is Kryptos Communications, Inc. developing Kryptos for other mobile phone operating platforms?
Yes. While Kryptos is presently available for use on iPhones which utilize the iOS operating system, the Company is developing Kryptos for both the Android and Blackberry operating systems.
When Kryptos is available on other operating platforms such as Android and Blackberry, will I be able to place calls cross-platform? i.e. from an iPhone to a Blackberry to an Android phone?
Yes. Kryptos is being developed to be cross-platform. As long as both phones have Kryptos installed and operating, then fully-encrypted conversations can occur between two users. Kryptos will function independent of whether a phone utilizes the iOS (iPhone), Blackberry or Android operating platform.
Will I be able to receive a Kryptos call while I am on a regular phone call or using another App on my iPhone?
If your iPhone is using the iOS 4 operating system, then yes, your phone has the ability to receive a Kryptos call while using other applications as long as you have Kryptos running in the background. Multitasking with iPhone iOS 4 enables users to receive Kryptos calls while other Apps are running, even when your iPhone is locked. Multitasking allows you to switch between recently used Apps by double-clicking the Home button (the round button at the bottom of the phone) to reveal your recently used Apps. Within the recently used menu area, you can reopen an App with one tap, or close an App by pressing and holding the App icon, then tapping to remove the selected App from the recently used lower menu.
I have added a new contact into my Kryptos contact list, however I am unable to connect a call to that new contact, what should I do?
Select the contact and select Edit. Please double check that the username is spelled correctly. Kryptos is dependent upon connecting two parties via the usernames. Also please make sure that Kryptos is also running on your contact's phone.
I am having trouble connecting any calls on Kryptos, what could be the problem?
Please verify that your phone has is connected to a WiFi, 3G or 4G network. If the phone has the proper connections and you are still having problems completing a call, please try stopping and restarting Kryptos by removing it from the recently used App menu and then reopening Kryptos from phone's main App menu area. iPhone iOS 4 multitasking allows you to switch between recently used Apps by double-clicking the Home button (the round button at the bottom of the phone) to reveal your recently used Apps. Within the recently used menu area, you can reopen an App with one tap, or close an App by pressing and holding the App icon, then tapping to remove the selected App from the recently used lower menu. In order to use an App that has been closed in the recently used App menu area, it is necessary to restart the App from your phone's main App menu area.
Does Kryptos Communications, Inc. keep log files on the calls that I make?
Absolutely not! The Company has no interest in maintaining such log files. However, for your convenience as a user, Kryptos the App maintains a history of your calls on your own phone, which can be erased at the discretion of the user by clicking clear on the History tab within the App.
Is there a cryptographic "back door" to Kryptos?
Absolutely NOT!! There is no cryptographic "back door" that provides master key access to conversations taking place or that have taken place using Kryptos. Your encrypted conversation cannot be decrypted by anyone other than the two parties participating on the Kryptos call session utilizing the 2048-bit RSA encryption for the session key exchange. After the session key exchange has been initiated using 2048-bit RSA encryption, the conversation itself is secured with military grade 256-bit AES encryption.