Total security is the
#1 Feature
Secure peer-to-peer communication
with end-to-end post-quantum encryption
Secure peer-to-peer communication
with end-to-end post-quantum encryption
KvantPhone uses a peer-to-peer approach with an end-to-end encryption architecture that directly connects the communicating parties. No central servers are involved. Encryption happens on each user’s device.
Only the communicating parties have access to the one-time encryption keys, so only they can decipher the calls and messages. Third-party access, including access by KvantPhone staff, is impossible. All this is 100% quantum resilient.
KvantPhone uses a peer-to-peer approach with an end-to-end encryption architecture that directly connects the communicating parties. No central servers are involved. Encryption happens on each user’s device.
Only the communicating parties have access to the one-time encryption keys, so only they can decipher the calls and messages. Third-party access, including access by KvantPhone staff, is impossible. All this is 100% quantum resilient.
Built-in quantum resistance in all features
Secure
messaging
Secure, encrypted messaging
is a standard feature of KvantPhone.
Secure
group chat
Message communication in groups also includes broadcast messaging.
Encrypted
conference calls
KvantPhone features secure conference calling between multiple KvantPhone users.
Secure
file sending
KvantPhone’s feature set also includes secure and encrypted file sending.
Continuously updated and regularly security-reviewed to protect your privacy.
Built-in quantum resistance in all features
Secure
messaging
Secure, encrypted messaging
is a standard feature of KvantPhone.
Secure
group chat
Message communication in groups
also includes broadcast messaging.
Encrypted
conference calls
KvantPhone features secure conference calling
between multiple KvantPhone users.
Secure
file sending
KvantPhone’s feature set also includes
secure and encrypted file sending.
Continuously updated and regularly security-reviewed to protect your privacy.
Security
Features
- Comprehensive, secure call and instant message features with military grade security and authentication features, encapsulating post-quantum encryption
- End-to-end encrypted calls with asymmetric keys and digital signature protection:
- Calls are not transmitted through a central server
- Keys are generated on the fly on the user’s devices are destroyed after every call and are not stored anywhere
- Built on the most secure algorithms which are recommended by prominent IT security experts and trusted by military services worldwide
- No backdoors: the communication cannot be deciphered even if the interceptor has the source code of the application or administrator access to the central servers
- Contact management with strong security – identity management with certificate handling
- Only necessary information is stored with strong protection of stored data
- No local authentication on the device – all authentication happens with the central authentication service
- Strictly guarded and monitored operation centers with several back-up locations and secret stand-by sites if disaster recovery is needed
- Servers used by the service can be deployed within an isolated corporate environment where it is impossible for the vendor or unwelcome third parties to gain access
- Secure user management features: all user management-related processes and procedures are secured in line with the highest safety standards
Network and
Coverage
- Worldwide service coverage – subscribers with proper internet access can use our services anywhere on the globe
- Requires only a generic IP network – Supported internet environments:
- Wi-Fi
- 3G, 4G, LTE
- Comprehensive independence from service providers, carriers, or networks
- Encryption cannot be perceived by the network service provider
- Automatic handover when switching between networks during active calls
Comfort Features
- Easy to use: provides high security yet remains easy to operate without changing the way you already communicate
- Superior voice quality, shortest delay
- Support of Mobile Device Management (MDM) systems
- Multitasking and push notification support
- Presence handling
- Do Not Disturb (DND) mode
- Support of multiple languages (EN, SE, CN, BR, HU, KOR)
- Call history with security features
- Setting of notification sounds and ringtones
- Bluetooth device support
- Call quality indicator
- Support of proximity sensor
- Handling of interruption of active KvantPhone calls by GSM calls
- Easy installation and activation
- Support services and SLA
Contact and
User Management
- Professional user management and administration interface for system administrators and managers:
- Application-level user management features for end users to keep their contacts easily organized
- Professional administration interface designed for system administrators and managers of your organization to manage user relations and visibility, moreover connections with other companies and other organizations using KvantPhone
Other Features
- Flat-rate, secure communication service: the monthly service fee includes unlimited free worldwide secure calls and instant messaging over Wi-Fi and mobile internet networks without additional per-minute or per-message costs
- Available as Software as a Service (SaaS):
- No long-term commitment or investment needed
- Customers pay a license (subscription) fee
- Available as an isolated hosted service or can be deployed with on-site company infrastructure
- Support of multiple platforms (iOS, Android)
- Customization of the application is possible upon request
- Legal solution to protect private and business communication
Designed to meet advanced business requirements
Enterprise features
EU vendor
Best value
From the cloud or
deployment on-site
The publicly available KvantPhone service is hosted by the vendor Arenim Ltd. However, should your IT or security policy require it, the KvantPhone backend can be installed in a dedicated private cloud or in your company’s internal network.
Professional admin interface
and user management
System administrators will find KvantPhone’s business solutions easy to configure and maintain.
The user management interface allows adding KvantPhone users from outside the enterprise in a trusted yet secure manner.
All user management procedures can be made compliant to match the strictest internal company policies.
KvantPhone offers several deployment types. Check out possibilities.
Designed to meet advanced business requirements
Enterprise features
EU vendor
Best value
From the cloud or
deployment on-site
The publicly available KvantPhone service is hosted by the vendor Arenim Ltd. However, should your IT or security policy require it, the KvantPhone backend can be installed in a dedicated private cloud or in your company’s internal network.
Professional admin interface
and user management
System administrators will find KvantPhone’s business solutions easy to configure and maintain.
The user management interface allows adding KvantPhone users from outside the enterprise in a trusted yet secure manner.
All user management procedures can be made compliant to match the strictest internal company policies.
KvantPhone offers several deployment types. Check out possibilities.
Some of KvantPhone’s enterprise features
Secure backup/restore
Remote user and data wipe
Broadcast messaging
Secure admin messages for users
SSO integration
Mobile Device Management Support
SoC, SIEM integration
White-labelling
Some of KvantPhone’s enterprise features
Secure backup/restore
Remote user and data wipe
Broadcast messaging
Secure admin messages for users
SSO integration
Mobile Device Management Support
SoC, SIEM integration
White-labelling
Post Quantum Cryptography & Comprehensive Protection
Best-Practice Cryptography & Comprehensive Protection
Media encryption
AES-256 in
GCM mode
Authentication
One Time Password
(RFC 4226)
Key exchange
X25519 + Kyber Key Encapsulation 1024 signed with Ed25519 + Dilithium5, E2E KEX
Private key
protection
Proprietary method for top security
(see White Paper for details)
Man-in-the-Middle
Protection
X25519 + KEM signed with Ed25519 + Dilithium5
Integrity
protection
Signed
Voice / IM packets
SRTP authentication
AES-GCM AEAD
RTP authentication
Secure RTCP
Replay Attack Protection
Ratcheting mechanism
Jailbreak / Rooting detection
Spyware protection
P2P conference calling
without mixing server
Perfect Forward
Secrecy
To understand the details of KvantPhone security, read the Security White Paper and
learn more about our security philosophy.
Ready to make your communication secure?
Guard against eavesdroppers with KvantPhone’s maximally reliable and secure communication service.
14 days with all features
|
Get a free consultation
|