FAQ
FAQ
The most commonly asked questions submitted by our users
What does this system allow ?
The system enables secure transmission and receipt of correspondence in electronic format encrypted with OTP key. We use dedicated HW to do this. In addition, End-to-end encryption is a security method that ensures the protection of communications. With End-to-end encryption, no one, can read messages as they travel between sender and recipient. In the near future, the ability to include attachments, voice messages, videos, etc., will be activated.
How does it work ?
The system creates an anonymous and confidential communication network (OTP GROUP), therefore making communication from and to others who are not part of it impossible.
Is the system reliable ?
Certainly. No one, not even those who designed it, will ever be able to hack encrypted messages.
Is the system independent ?
Certainly, the system is independent in a sense that there are NO Central Servers that can be turned off / disabled / controlled by third parties. The user is the only owner and responsible for his equipment and has full control over it.
Can I later expand my initial configuration ?
NO. For security reasons, the system architecture does not provide for KNOTS increase after activation. So, the customer decides the number of GROUP KNOTS at the time of ordering.
What happens if a KNOT fails ?
The system for the part of the remaining non-faulted KNOTs will continue to operate. Therefore, the failed KNOT will be automatically excluded from the system.
Is it possible to replace a KNOT ?
No. Since we do not have it’s original keys, we cannot replicate the KNOT itself.
How can I be informed of the available KNOTs ?
Each KNOT is able to list the other KNOTs in the network and, of these, highlight those that are
active at that time (Green/Light=reachable Orange=unreachable).
What happens if a KNOT is turned off ?
The sender KNOT holds the message in memory until the receiver KNOT is turned back on.
(Number) before Name means queued messages on unreachable User (Light Orange color)
How am I informed of the remaining availability of keys for a transmission ?
The system can report the remaining capacity of keys available for transmission well in advance of the end of the keys. The keys that can still be used are indicated for each recipient.
Hovering the pointer over the recipient activates a context tooltip message that displays related information.
Who is in charge of storing transmitted messages ?
For security reasons, the system merely conveys the message and is not responsible for storing it
on the device. Any saving of the message (and the resulting risk of copying) is the exclusive
responsibility of the user. (GREY=UNSAVED, RED=SAVED)
How can I remove the messages ?
Transmitted messages are automatically removed from the source KNOT the moment they are received by the device for which they are intended. If I am the receiver, I can remove them voluntarily. In any case, ALL messages are removed when the KNOT is turned off (exluded eventually saved messages).
Are OTP messages encrypted?
In cryptography, OTP is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a secret key. Our Software EncPriMes use OTP pre-shared secret key.
How do I send an encrypted text message?
After purchasing at least one pair of Knots, connect the supplied server to the network and power it up. Then when the Notebook Client PC is turned on, activate the EncPriMes 1.0 program. Finally compose the message and select the Knot to send to. When you send the message, the system EncPriMes will perform all the necessary operations to securely encrypt and send.
Can an OTP be decrypted?
If the key is random and never re-used, an OTP is provably unbreakable. Any ciphertext can be decrypted to any message of the same length by using the appropriate key. Thus, the actual original message cannot be determined from ciphertext alone, as all possible plaintexts are equally likely.
Can someone receive my OTP?
In EncPriMes the OTP key is preloaded in the KNOT. Therefore, there is no danger that someone can intercept it to make fraudulent or unauthorized use of initial message cannot be determined from ciphertext alone, as all possible plaintexts are equally likely.
What is the most secure way to send messages?
With EncPriMes you get the guarantee of maximum security. We use a system architecture that achieves the highest security available to date. In fact, the customer has sole ownership of all components of the transmission chain necessary to send the message to the recipient, without it being able to be read by others.
We use pre-shared symmetric key, end-to-end encryption, random OTP key, and backdoor-free hardware
How do I encrypt and decrypt text messages?
Enter any text to be Encrypted. Encrypt with a custom secret key. Enter Secret Key (Remember, the encrypted text can’t be decrypted without this secret key) Encrypted Output.
Send to selected KNOT/KNOTs of cryptograped message.
All tasks done by EncPriMes is completed
Didn’t find in our FAQ the answer you were looking for?
write us and we will help you overcome your doubts.