The quantum threat and why post-quantum communication is a must | Read article
+ 44 (20) 8089 0000 | sales@kvantphone.com

 

 

 

 

 

 

Find useful information and documents about our service.
See how we compare and how our customers benefit from using KvantPhone.

About our services and security

About our services and security

 

Why trust KvantPhone?
Our security philosophy

Learn more about our
security philosophy.

Our security philosophy

 

KvantPhone Security
White Paper

Discover how KvantPhone makes your
communication completely secure.

Read White Paper

 

 

Markets &
Case Studies

See how our cutomers
from various sectors
benefit from using KvantPhone.

Read Case Studies

 

Product
brochure

See KvantPhone’s
main features.

Open brochure (PDF)

 

 

KvantPhone
Press Material

See high resolution images
of our product and people.

Open press page

 

 

Support Center &
Frequently Asked Questions

Got any questions? Go to our Support
Center for assistance or to submit a
question.

Open Help Center

 

Technical articles about quantum resiliance and PQC

Technical articles about quantum resiliance and PQC

 

Why to secure
communication

Learn more about why to use
secure communication tools

Read our article 

 

The quantum
threat

Understand in detail the quantum threat and why post-qantum communication is a must.

Read the article

 

Classical vs. quantum
cryptography

Understand basic differences between classical and quantum cryptography.

Read our article

 

 

Types of post-quantum
cryptographic algorithms

Learn about quantum resistant algorithms or post-quantum cryptography (PQC)

Read our article

 

 

Quantum Computing
in TLS

TLS, the basic security layer for internet communications is also challenged by quantum computing.

Read our article

 

 

EJBCA and post quantum
preparedness

The challenge og migrating EJBCA Public Key Infrastructure (PKI)
to Post Quantum Cryptography (PQC).

Read our article

 

Reports and articles about surveillance

Reports and articles about surveillance

Explore useful articles and reports we have collected about surveillance and eavesdropping.

 

 

The Race to Save Our Secrets
From the Computer of the Future

Quantum technology could compromise our encryption systems.

Read article

 

 

Europe’s First Quantum Computer with More Than 5K Qubits Launched at Jülich

Read article

 

 

 

US announces new retrictions to curb global spyware industry

State department policy will allow US to impose visa restrictions on individuals involved in misuse of spyware

Read article

 

 

 

 
WhatsApp hacked and
bugs in Intel chips

 

What you need to know to protect yourself.

Read article

 

 

 

What are quantum-resistant algorithms – and why do we need them?

When quantum computers become powerful enough, they could theoretically crack the encryption algorithms that keep us safe. The race is on to find new ones.

Read report

 

 

 

 
Leaked emails

Ramaphosa’s hypocrisy on spying by the South African state.

Read article

 

 

 

FORBES on governmental
surveillance

“Statistics on how often your phone
company hands data over to law
enforcement.”

Read article

 

 

Keys Under Doormats
(MIT Report)

Mandating insecurity by requiring
government access to all data and
communications.

Read report

 

 

 

The Professional’s guide to Quantum Technology

A handbook with everything you need to know about Quantum Technology.

Read the article

 

For our users

For our users

 

KvantPhone
User’s Manual

For iOS users.

Open manual

 

 

KvantPhone
User’s Manual

For Android users.

Open manual

 

Admin Guide
for System Administrators

 

Open the guide

 

Technical
requirements

What are the technical requirements
to use KvantPhone?

Open page

 

Legal aspects
of our service

Open page

 

 

KvantPhone
Master Service Agreement

Download (PDF)

 

Will you be using Kvantphone
for personal or business purposes?

Personal use

Encrypt your personl digital online communication with KvantPhone’s end-to-end, quantum resistant encryption.

Business use

Increase business productivity with complete business communications privacy and security.