Secure Peer-to-Peer Instant Messenger with intuitive design and modern features you've come to expect, and some you haven’t, including:
Allows you to pre-define a special “Duress” Phrase that when entered in-place of the Access Phrase, will without warning wipe and reset the application.
Easy viewing of encryption keys allows easy fingerprint verification of sessions between users, thwarting Man-In-Middle type attacks easily and conveniently.
Our business is designed around providing quality of our Products and services to our customers. You are our customers NOT our product!.
Our systems are designed NOT to log any information about our users, such as location or movement or device statistics like MAC or IMEI numbers etc...
Our messages are sent through a user-to-user (peer-to-peer) method, we don’t proxy via cloud services or otherwise, just to make message delivery a few milliseconds faster…
were safe & fast not fast & safe.
Provides an additional layer of security by requesting an additional 4 digit Phrase to obtain access to the application.
Set a timer on your messages that once read will be removed, or if you send a message in error you can remove them form the conversation flow.
A peer-to-peer (P2P) network is created when two or more devices are connected and share resources without going through a separate server computer. A P2P network also can be a network with special protocols and applications among users or devices over the Internet.
Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. Kripter.io uses OTR with a combination of AES symmetric-key algorithm with 256 bits key length. In addition to authentication and encryption OTR provides perfect forward secrecy and malleable encryption.
Advanced Encryption Standard (AES) is one of the most secure encryption algorithms available today. Cracking a 128 bit AES key with a state-of-the-art supercomputer would theoretically take thousands of years, and kripter.io uses 256 bit keys! As of today, no practicable attack against AES exists.