Find useful information and documents about our service.
See how we compare and how our customers benefit from using KvantPhone.
About our services and security
About our services and security
Why trust KvantPhone?
Our security philosophy
Learn more about our
security philosophy.
KvantPhone Security
White Paper
Discover how KvantPhone makes your
communication completely secure.
Markets &
Case Studies
See how our cutomers
from various sectors
benefit from using KvantPhone.
Support Center &
Frequently Asked Questions
Got any questions? Go to our Support
Center for assistance or to submit a
question.
Technical articles about quantum resiliance and PQC
Technical articles about quantum resiliance and PQC
The quantum
threat
Understand in detail the quantum threat and why post-qantum communication is a must.
Classical vs. quantum
cryptography
Understand basic differences between classical and quantum cryptography.
Types of post-quantum
cryptographic algorithms
Learn about quantum resistant algorithms or post-quantum cryptography (PQC)
Quantum Computing
in TLS
TLS, the basic security layer for internet communications is also challenged by quantum computing.
EJBCA and post quantum
preparedness
The challenge og migrating EJBCA Public Key Infrastructure (PKI)
to Post Quantum Cryptography (PQC).
Reports and articles about surveillance
Reports and articles about surveillance
Explore useful articles and reports we have collected about surveillance and eavesdropping.
The Race to Save Our Secrets
From the Computer of the Future
Quantum technology could compromise our encryption systems.
US announces new retrictions to curb global spyware industry
State department policy will allow US to impose visa restrictions on individuals involved in misuse of spyware
What are quantum-resistant algorithms – and why do we need them?
When quantum computers become powerful enough, they could theoretically crack the encryption algorithms that keep us safe. The race is on to find new ones.
FORBES on governmental
surveillance
“Statistics on how often your phone
company hands data over to law
enforcement.”
Keys Under Doormats
(MIT Report)
Mandating insecurity by requiring
government access to all data and
communications.
The Professional’s guide to Quantum Technology
A handbook with everything you need to know about Quantum Technology.
For our users
For our users
Will you be using KvantPhone
for personal or business purposes?
Personal use
Encrypt your personl digital online communication with KvantPhone’s end-to-end, quantum resistant encryption.
Business use
Increase business productivity with complete business communications privacy and security.