[email protected]

SECURE VIDEO CONFERENCING
FUNCTIONALITY HAS ARRIVED


Up to 50 participants, Highest possible Quality of voice
And video streams - Conference MEETING scheduling
feature - TEXT Chat during audio and video calls

Total rewrite of mobile code using latest programming
techniques for optimal app performance!

Nothing can pry into Pryvate

Securing Mobile And Digital Communications

Talk + Chat + Video + Browse + Share With Ease & Security!

Securing Mobile And Digital Communications

Talk + Chat + Video + Browse + Share With Ease & Security!

Nothing can pry into Pryvate


header-icon-1
header-icon-2
header-icon-3
header-icon-4
header-icon-5

Cyber crimes have increased 300% in 2020 (cybintsolutions.com) with 95% due to human error. 30,000 websites are hacked each day (techjury.net).This is probably happening to you. Right now. Your voice calls, messaging, video calls, emails, texts, chats, data transfer are all vulnerable to attack and breaching of your data each day in your work and personal life.

How?
Because your security encryption keys are easy to find and held by others, often third parties you don’t know about.

Pryvate stops that from happening. Our app on your device(s) encrypts your activity. No records exist of your communications which means that hackers don’t have anything to hack.

ccss certificate_1 certificate_2 certificate_3 certificate_4
awards

Criptyque Limited (Jersey) receives a Frontrunner Award in the category of Information Technology at the 2021 Go Global Awards.

ABOUT PRYVATE

What is Pryvate?

Established in 2013, Pryvate takes very seriously the threat by criminals to undermine the proper and useful purpose of the Internet. Professionals in the Communications Technology industry accept that inadequate or faulty security is a real and ever present threat to a safe and properly functioning internet.

Since 2013 Pryvate has joined individuals, organizations and NGO’s in the work to provide secure communications platforms and safer internet.

Our company has no access to any of the user’s encryption keys - there is no ‘man in the middle’ - so it is impossible to leak, hack, collaborate or give away keys.
We don’t possess any sensitive information. All communications are device-to-device. It is the

Pryvate app on your device that encrypts your voice, video or text, and the Pryvate app on the recipient’s device that encrypts theirs. No records exist of any communications and the encryption key is discarded.

Our Vision

Do you know who has access to your private information?
The communication revolution brought by the mobile phone has allowed us to share our most personal information, our innermost thoughts and our most intimate desires, fears and hopes with … the governments of North Korea, China and Russia, with Google, Apple and Microsoft, with MI5, Her Majesty's Revenue and Customs, Facebook, your internet service provider, insurance companies and (last but not least) criminal organisations that prey on the unwary and the unprotected.

In the old days, we all felt very strongly about privacy. If we thought that our most intimate correspondence was available to strangers, to use and perhaps abuse, we would have been horrified. Your personal diary, your letters, your family photos were only for people you wanted to share them with. We all instinctively understood the nature of something that went to the heart of our selfhood. Breaching this privacy, would have been an utter betrayal of trust.

Now, it is done as a matter of casual routine.

Find Out More!

the team

Our team of professionals are dedicated to making Pryvate your #1 source for privacy protection.
We have a complete group of developers educated in technology, business solutions and creative design that will make your experience all you expect it to be.

With forward thinking developments, rooted in blockchain and cryptocurrency, we are charging forward with a complete decentralized solution that will keep delivering your data and private information, as securely as can be.

The management personnel are all highly experienced (over 20+ years average pertinent experience). The team is led by Jonathan Parker Bray, who has successfully developed and sold several telecommunications companies. The team is complemented by the company’s Advisory, who are also highly experienced. They provide invaluable financial, technical and legal support to the company.

bray Jonathan Parker-Bray
Chief Executive Officer

He has been in the telecommunications industry for 15 years. He founded Peach Technologies and is also a co-founder of Expo Communications PLC, listed on the Alternative Investment Market in 2003 for UK£56M. He relocated to Monaco running Monaco Tech Services, a consultancy company, along with BlueBottle Technologies Inc., a global IT consultancy firm dedicated to integrating innovative tech that delivers wireless solutions to large corporations and governments.
ricky Ricky Magalhaes
Privacy Security Manager

He is an international cyber security data protection architect and expert with over 20 years of experience leading IT Security initiatives. He currently heads the Offshore Security Services Division of Logicalis where he and his team build global security cloud services international telcos and software vendors. He has been a trusted advisor on cyber strategy for brands like Intel, McAfee, Cisco, Microsoft, BAE, Lockheed martin, AT&T, Telefónica, IOD, and IBM.
jan Jan Vekemans
Senior Operations Manager

He is an engineer with 30 years of experience in the IT sector. He was Managing Director of Netilla Networks Europe, Ltd. and responsible for its sales and marketing efforts. He successfully developed Vasco Data Security’s two-factor authentication business, evangelised and sold Public Key infrastructure at Baltimore Technologies, Cryptocard and Regify.
upi Upkar Sahota
Senior Programmer

He has many years of experience in the IT field. He is a Senior Developer at BlueBottle Technologies Inc., a global IT consultancy firm dedicated to integrating innovative tech that delivers wireless soltuions to large corporations and governments. He was Director at Numeria and Spartacus Complex, both IT consultancy firms serving the telecommunications industry.
chris Christophe Deschamps
Senior Technical Team Leader

He is a telecom software engineer with more than 20 years of experience in consulting, education, sales and engineering. He specializes in VoIP and Unified Communications solution development, architecture and deployment. He has worked with major telecom operators,equipment manufacturers and service providers across Europe, including Vodafone Oracle, IBM, as well as many start-ups, advising them on the implementation of new innovative communication services.
WalidBW Walid Kamhawi
Advisory Board Member

20+ year career in investments: Blackstone Group, the Russian Direct Investment Fund, Bear, Stearns and HK Advisory.
chris Martin Woolley
Business Development

With over 30 years’ experience in Telecoms and IT Security Martin is responsible for client and partner business growth. He has worked globally with leading technology service providers including Cable and Wireless, Integralis Security, Vodafone and Verizon where he has held various leadership roles with a focus on creating innovative solutions and driving sales. His specialism is building strong value-based relationships with clients, channel partners and alliances.
Buildings1

technology

keypad-phone

Quantum Encryption

Pryvate voice and video over IP communications offer robust encryption against attacks of quantum computers.

The algorithm:

CRYSTALS-Kyber algorithm is most likely the first implementation in the world to provide secure voice and video communications. We ensured that the algorithm reaches the same level of effectiveness even if the cryptographic keys are much larger and that the algorithm remains resilient to classic attacks. It is interoperable with encryption features offered by previous versions.

Features:
- Integration of KEM in ZRTP protocol: We created a modified version of ZRTP that accepts a key exchange algorithm of the ‘key encapsulation mechanism’ type;
- Hybridisation: We created an encryption engine that combines classic ECDH and post-quantum encryption. The ZRTP protocol was modified so that it can handle two different key exchange algorithms at the same time and securely combine the results;
- Fragmentation: We added a mechanism to fragment ZRTP packets;
- We integrated this new ZRTP library with post-quantum capacities into Pryvate and added configuration settings

keypad-phone

Encrypted Voice Calls (VOIP)

All your calls are free (VOIP)- No roaming charges or hidden costs

Connection Via 3G/4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA, & WIFI

All your calls are secure encrypted and completely private

Encryption keys are automatically created on your smartphone for each individual calls only

These single section only keys are never stored or known to PRYVATE

User to user for all PRYVATE communications. No servers in the middle, so no record of any voice conversation

Video encrypted, unique keys per call

Conferencing - encrypted audio (conference runs on device - the subscriber initiates the conference by calling the other parties and adding them to the conference)

cam

Encrypted Video Calls

Different types of video streams for different price brackets

Region-specific videos

Media or device-specific videos

Software-specific videos

Adaptive streaming

Secure Video Encryption and Privacy (never known to us)

ZRTP Protocol negotiates a key between two VoIP end points

A Video with codecs : VP8 (WebM), H263, H263-1998, MPEG4, theora and H264 (thanks to a plugin based on x 264) - with resolutions from QCIF(176x144) to SVGA(800x600) provided that network bandwidth and cpu power are sufficient

icon-chat

Encrypted Private IM

IM Encryption
The number of potential hackers and government agencies that may be monitoring your online conversations - including your instant messages - has never been higher. If you’re using an open wireless connection, there are numerous free software packages that can intercept unencrypted Instant Messaging (IM) communications. Even password protected wireless networks leave you vulnerable to monitoring from your broadband or software providers. It is therefore essential that you consider your online security when it comes to instant messaging – whether you use it for personal or business purposes.

What is IM Encryption?
Pryvate IM encryption is a varied implementation of Signal protocol, along with a ZRTP call through an oral SAS verification to provide mutual identity authentication as added MiTM attack protection security.

Technical specification document
email

Secure Pryvate Email

Securely designates any or all of users current email addresses and services

Agnostic platform; Android to IOS or vice versa

Easy to maintain for IT staff, as users can keep existing technology and procedures. There is no need for re-training on new platforms

3G, EDGE, GPRS, UMTS, HSPA, W-CDMA, & Wi-Fi connections

Encryption keys are automatically created on users smartphones for each individual email – with the associated single-session keys never stored or known to Pryvate

All communication between a user’s app and the server is fully encrypted, TLS-based or RSA4096-protected

Key material that is encrypted for sending to the server in-device is done by using the public key of an RSA4096 key pair

The connection between app and server is therefore considered unbreakable using current techniques and technology

import

Secure File Transfer

If you want peace of mind that your important files can be safely transferred without of the worry of them being intercepted by someone else, Pryvate has the ideal solution for you. Pryvate secure file transfer will allow you to transfer your private files or data securely - using military grade encryption. You will be able to transfer securely your data from your personal device via email or by utilising file sharing programmes such as Dropbox, One Drive, or BOX securely. Your secure file transfer will be free from prying eyes, competition and hackers and more when you use Pryvate.

The file storage component of Pryvate also works when you want to encrypt a big file and have it delivered to a third party by means of CD/DVD/USB storage device. The Pryvate app will automatically encrypt your file and store it in the inbox of the app, instead of sending it via email. When the recipient has the file on their device, they simply click the .pry message and the app works its magic. File transfers are now made securely, are privately and protected.

server

Secure File Storage

As part of the secure file transfer process, Pryvate secure file storage can protect your personal or corporate files utilising secure military grade encryption. Whether you are storing your files on a device, PC, laptop or using a file share programme such as Dropbox or BOX, Pryvate will ensure that your files are encrypted and safe from any potential hackers, corporate espionage or your competition. Encrypted files are stored without being ‘sent’ as happens with traditional email. The Pryvate application allows the encrypted files to be securely stored on your device.

Encrypted files are stored without being ‘sent’ as with traditional email. The Pryvate application allows the encrypted files to be securely stored on your device or they can also be stored securely on external devices, such as CD/DVD’s or USB devices. The decryption key is never located on the device/location - so your securely stored files are safe. If your device should be lost or stolen then you can be confident that your files cannot be compromised.

world

Pryvate Onion Browser

Pryvate Onion Browser is an ad-less web browser that uses Tor/I2P to protect your privacy.

Features:
- Anonymously browse the internet without websites knowing your real IP address.
- Navigate the internet without your ISP tracking you.

Use Incognito Mode to browse without leaving a footprint, download Orbot and turn on TOR proxy support to mask your identify and location

HiRes-Icon-1024

Pryvate Technology In Detail

Pryvate™ Encrypted Voice Calls (VOIP)

It is always best to use open-source, peer-reviewed encryption tools on your smartphone, tablet and desktop computer. The Pryvate app for Android (2.2 or higher) and Apple (iOS 6.0 or later) features voice encryption capabilities that enable subscribers to make free, voice over internet protocol (VoIP) calls that are secure, encrypted and completely private.


Pryvate™ Encrypted Voice Calls (VOIP)

It is always best to use open-source, peer-reviewed encryption tools on your smartphone, tablet and desktop computer. The Pryvate app for Android (2.2 or higher) and Apple (iOS 6.0 or later) features voice encryption capabilities that enable subscribers to make free, voice over internet protocol (VoIP) calls that are secure, encrypted and completely private.

Pryvate™ Encryption

  • Military-grade encryption combined with RSA 4096-bit and AES 256-bit encryption
  • No risk of data being intercepted by hackers, criminals or government surveillance agencies
  • Diffie-Hellman (D-H) key exchange, MD5 and SHA512 hash for voice integrity
  • Proprietary ‘Protection Agent’ software that detects, alerts and defends against ‘man-in-the-middle’ attacks
  • Encryption keys that are automatically created on your smartphone for each call

Voice Call Quality – Multiple Network Compatibility

  • Industry-leading encrypted voice service that operates over carrier-grade infrastructure
  • Secure calling over 3G/4G, GPRS, EDGE, LTE, UMTS, HSPA, W-CDMA or Wi-Fi connection – even at low bandwidths

Security

Single-session-only keys are never stored or known to Pryvate as the software works on a peer-to-peer basis with no servers in the middle - so no record of calls is ever kept.

Automatic Discovery of Pryvate Contacts

  • Auto-notification when a contact becomes a Pryvate user
  • Users will also be able to see when their Pryvate contacts are available
  • Contact details will automatically populate their Pryvate address book

Secure Conferencing

We utilize the same encryption whilst conferencing with multiple users – with all voice calls encrypted. The conference call runs on the conference organizer’s device. They initiate the conference by calling the other parties and adding them to the group.

Pryvate™ Encrypted Video Calls

Video Encryption

Video encryption takes video data and makes it impossible to view by anyone except the intended recipient – so long as the intended recipient has the correct key to decipher the data and view the video in its intended format. There are two types of video encryption: personal and Digital Rights Management (DRM). Personal encryption refers to someone who wants to share a personal video with clients, family or friends and who does not want anyone unauthorised to see it. DRM is the same thing, although more complex. It can often include:

  • Different types of video streams for different price brackets
  • Region-specific videos
  • Media or device-specific videos
  • Software-specific videos
  • Adaptive streaming
  • Secure Video Encryption and Privacy (never known to us)
  • ZRTP Protocol negotiates a key between two VoIP end points

As with voice calls, a new key is generated every time a connection is made, which further protects the security and integrity of the data. This means that if an encryption key from a previous call was discovered – subsequent calls would not be compromised.

Video Encryption Interoperability Standards

Video codec specifications include:

  • VP8 (WebM), H263, H263-1998, MPEG-4, Theora and H264
  • Resolutions from QCIF (176 × 144) to SVGA (800 × 600)

Secure IM Encryption from Pryvate™ s

  • Auto encrypted single/unique single session
  • 3G and 4G, EDGE, GPRS, LTE, UMTS, HSPA, W-CDMA and Wi-Fi
  • Peer to Peer – with no servers in the middle
  • No records of any messages or conversations are stored
  • AES symmetric-key, Diffie-Hellman and SHA-1 hash algorithms
  • User sessions are automatically deleted after a session is terminated

The application operates in standard unencrypted mode for normal conversations. If a secure conversation is required, the user activates secure mode, which initiates an authentication phase. This allows the user to verify the identity of the other party through a pre-arranged password, question and answer combination or fingerprint. Once authenticated, the application generates short-lived, session-based encryption keys – providing secure communications and perfect forward security. This ensures that the discovery of a past key does not compromise the security of future sessions. During secure IM conversations, digital signatures are removed and logging is disabled to ensure deniability.

Notification of Screenshots

An innovative security feature of Pryvate’s service detects when a screenshot is taken from within the Pryvate App. When this happens, the App automatically notifies the sender that the recipient is making a record of confidential information.

Pryvate™ Encrypted Instant Message

The number of potential hackers and government agencies that may be monitoring your online conversations, including your instant messages has never been higher. If you’re using an open wireless connection, there are numerous free software packages that can intercept unencrypted Instant Messaging (IM) communications. Even password protected wireless networks leave you vulnerable to monitoring from your broadband or software providers. It is therefore essential that you consider your online security when it comes to instant messaging – whether you use it for personal or business purposes.

What is IM Encryption?

Pryvate IM encryption is a varied implementation of Signal protocol, along with a ZRTP call through an oral SAS verification to provide mutual identity authentication as added MiTM attack protection security.

Secure IM Encryption from Pryvate™

Pryvate Instant Message Encryption implements the Signal protocol allowing users to privately and asynchronously exchange messages, also supports multiple devices per user and multiple users per device.
Pryvate IM encryption establishes encrypted sessions and encrypts messages but relies on Pryvate to acquire the unique identification string of peer devices and route the messages to their recipients.
The Signal protocol specification utilises the Double Ratchet Algorithm the X3DH Key Agreement Protocol and the Sesame Algorithm.

Containerisation

Application containerisation ensures that all received attachments sent through Pryvate instant messaging are safely kept inside the application space unless and until they are exported or sent to an external viewer for any attachments that require an external viewer.
A parameter inside our chat rooms allow users to also automatically store received photos and videos inside phone Gallery if they so choose.
Containerisation also applies for sent attachments that are generated inside the app, meaning photos and videos that are taken within the app and then sent. Agnostic platform; Android to IOS or vice versa; adaptable to existing email addresses

Pryvate™ Encrypted Email

Email encryption software is intended to eliminate the risks posed by network eavesdroppers. In general, email communications are passed through the ether using unprotected protocols such as SSL/TSL. The emails are therefore transmitted in plain text across local networks and the internet. As a result, email messages and their attachments can be intercepted and read by those wishing to attack users maliciously or monitor their messages. It is not just potentially sensitive information that is at risk (such as bank details, log-in credentials, and so on). Hackers, who gain access to email messages, can access content from users and their contacts – or even hijack their entire email account.

  • Securely designates any or all of users current email addresses and services
  • Agnostic platform; Android to IOS or vice versa Easy to maintain for IT staff, as users can keep existing technology and procedures. There is no need for re-training on new platforms
  • 3G, EDGE, GPRS, UMTS, HSPA, W-CDMA, & Wi-Fi connections
  • Encryption keys are automatically created on users smartphones for each individual email – with the associated single-session keys never stored or known to Pryvate™

This not a mail client. It contains only the protection mechanism required to make a user’s emails secure. What it does is assure users that no unsecured data will ever remain or leave the device and that encryption data will be stored separately on Pryvate’s servers. By separating the encryption and the key, we have built in an added layer of security and removed the need for users to input additional SMTP/POP3 settings when setting up their client.

Pryvate™ Email Encryption – Technology Specifics

We have built in a layer of security that goes beyond that proposed by the British Standards Institute.

  • All communication between a user’s app and the server is fully encrypted, TLS-based or RSA4096-protected Key material that is encrypted for sending to the server in-device is done by using the public key of an RSA4096 key pair The connection between app and server is therefore considered unbreakable using current techniques and technology.
  • The return communication to the app from the server is protected by the AES 256-bit key that is sent to the server (RSA4096) and can be read only by the server
  • Newly generated key for each communication session, which is never stored TLS-certificated secure link – which adds to the security, helps avoid ‘man-in-the-middle’ attacks and is in accordance with BSI TR-03145
  • Pryvate™ only uses true and tested public algorithms (RSA4096 and AES256) in international implementations with NO backdoors. This is a requirement of BSI TR-03116-4. Additionally, all DNS requests are routed through our servers and are compliant with DNSSEC.
  • Once the message is encrypted and encapsulated in the .pry attachment it is sent directly to the user’s current mail client on their device (hopefully this is a DANE compliant mail transport). Because we have no control over the user’s choice of email client, we make the data as secure as possible – which is why we separate the key material from the data.
  • We comply with Datenschutzanforderungen (BDSG) and Richlinie BSI TR-03108, which makes our product one of the few software tools that are above the level of security highlighted in Sicherheitskonzept TKG- ISO27001.

Pryvate™ Secure File Transfer & Storage

  • Eliminates the risk that any files transferred will be intercepted whilst in transit.
  • Send/store files and data – protected by military-grade encryption – from a personal device via email or by using file
  • sharing programs such as Dropbox, One Drive, or Box
  • Secure file transfers can be stored without being sent.
  • Encrypted form on a mobile device or on media storage, such as: CDs, DVDs and USB flash drives.
  • Decryption key is never located on the same device or file location. If a user’s data is stolen, the files and data remain secure.
  • Without the need to ‘send’ files to ensure their encryption, secure file transfers can be made via the “SCP” with no limit on file size (as normally experienced with email)
  • Decryption is accomplished using the same method as encryption
  • No extra software is required.
  • Key material cannot be compromised, as it never resides with the encrypted file. Our file storage component also works when a user wants to encrypt a very large file and have it handed to a third party on a storage device. The “SCP” automatically encrypts a user’s files and stores it within the inbox of the App. When the recipient (the third party, for example) has the file, they simply click the .pry message and it opens securely

Pryvate™ Secure File Transfer

If you are after the peace of mind that your important files will be able to be safely transferred without of the worry of them being intercepted by someone else, Pryvate™ has the ideal solution for you. Pryvate™ secure file transfer will allow you to transfer your private files or data securely using military grade encryption. You will be able to safely transfer your data from your personal device, via email or by utilising file sharing programmes such as Dropbox, One Drive, or BOX securely. Your secure file transfer will be free from prying eyes, competition, hackers and more when you use Pryvate™.

What Makes Pryvate™ So Secure?

The Pryvate™ platform allows for secure file transfers to be stored without being “sent”. Files can be stored in an encrypted format on the device, on CD/DVD or USB storage device. The decryption key is never located on the device or file location. This will ensure that if you should you lose or have your device stolen; the culprit will not be able to break into your files. Without the need to ‘send’ files to ensure secure encryption, secure file transfers can be made via the Pryvate™ app, resulting in no limitations in terms of file size as you would experience with email. The same method for encryption is used for decryption and no extra software is required. The key material can’t be compromised as it never resides with the encrypted file.

The file storage component of Pryvate™ also works when you want to encrypt a big file and have it delivered to a third party by means of CD/DVD/USB storage device. The Pryvate™ app will automatically encrypt your file and store it in the inbox of the app instead of sending via email. When the recipient has the file on their device, they simply click the .pry message and the app works its magic. File transfers are now made securely, privately and protected.

Combine this with disk encryption to have a fully safe and fool-proof system of safeguarding privacy and security for confidential or sensitive information. Whether you keep a stock of private images/videos that nobody should know about, or whether you carry around the design plans for a nuclear fusion reactor… with this system they are always available for you and kept from prying eyes.

Pryvate™ Secure File Storage

As part of the secure file transfer process, Pryvate™ secure file storage can protect your personal or corporate files utilising secure military grade encryption. Whether you are storing your files on a device, PC, laptop or using a file share programme such as Dropbox or BOX, Pryvate™ will ensure that your files are encrypted and safe from any potential hackers, corporate espionage or the competition.

Encrypted files are stored without being ‘sent’ as with traditional email. The Pryvate™ application allows the encrypted files to be securely stored on your device. They can also be stored securely on external devices such as CD/DVD’s or USB devices. The decryption key is never located on the device/location therefore your securely stored files are safe. If your device should be lost or stolen you can feel confident that your files cannot be compromised.

Pin Encrypted Mobile Protection

Pryvate™ is a user-friendly APP that once installed, will revolutionise your communications!
We have taken steps to secure every aspect of the app and added best-of-breed security to each element. As voice and video share the same root, we have treated them equally in our platform and have also added secure protection for instant messaging.

With our triple layered secure voice component, users experience quality voice and video communications, incorporating RSA4096 encryption intermingled with AES and DH key exchange as a MiM flag.

In addition to this, our secure communications platform also has an integrated encrypted email component. The component mail is not a mail client at all, as it only contains the protection mechanism required to make your email safe and secure. No unsecured data will ever leave the device, but encryption data will be stored separately with Pryvate™. By separating the two elements, we have built in an added layer of security. This results in no need for users to input additional SMTP/POP3 settings when setting up their email client.

Additionally, we have an extra layer of security. To protect access to our App there is a PIN that acts as an extra activation code – making eavesdropping impossible.

Multiple Account Management

It is standard practice in most businesses for employees not to be allowed to manage their own email accounts. The installation and activation of all corporate software is invariably handled by security officers, IT staff or line managers. This has the unfortunate consequence that central departments often find it difficult to keep track of the state of their network. So, to enable greater network transparency we have built a management dashboard that allows authorised employees to see:

  • Which accounts are active
  • How many licences are being used or are still available
  • The associated costs

This results in greater security for an organisation, as well as better ease of use for the HR, IT departments and any other authorised personal.

The activation element of the software makes it user-friendly and easy to add new employees to the network. At Pryvate, we can import lists of employees and activate or deactivate accounts or this can be left to an HR department (which usually has the most up-to-date records), IT or security officers – depending on a user’s corporate policy.

Multiple Account Management is particularly valuable once more than 50 people are using our software – although many clients with fewer staff still use it because of its flexibility, transparency and improved security.

Pryvate™ Encrypted Web Browsing (Coming soon)

Feel confident when sharing personal information or banking online with Private’s™ proprietary web browser.

Pryvate™ encrypted web browsing offers secure, private web browsing for you, your family and the people who work with you through our bespoke web browser, which has been built with end-to-end implementation of anti-traffic analysis measures. Our secure browser will disguise your IP address which can often be tracked by criminals to locate your residential address.

From the provision of a basic proxy service, right through to using the Private™ network with full HD video, you can rest assured that no individual relay will ever be able to decipher the complete path that any particular data packet has taken. Our secure browser will use random pathways through several internet relays to obscure your location and a compromised relay cannot use traffic analysis to link the connection’s source and destination.

Pryvate Key Technical Data

Pryvate™ uses ZRTP encryption for both Voice and IM. The subscribers’ handsets negotiate the encryption keys between themselves so the key is never known to us. A new key is generated for each call or IM session, enforcing perfect forward secrecy. This means that if an encryption key is discovered for a previous call or IM session, any subsequent communications are not compromised.

For our secure email transfer and storage solution, the subscriber’s private email key is stored on the device and protected by a personal password which is never divulged to Pryvate™.

In regions where VoIP calls and IM are blocked by operators or governments, the system will automatically detect the situation and utilise the secure, encrypted and private network provided by our software.

In regions where anti-blocking technology may be a concern, our software will present the host with Pryvate’s™ public IP address so that the remote host does not detect the subscriber’s actual IP address. This then prevents the host from determining the subscriber’s location.

All aspects of security are considered when you use Pryvate™.

Pryvate Backend Services

Pryvate’s™ default method of key management ensures privacy for our subscribers as neither us nor any associated parties have any access to the end user’s private keys. This prevents Pryvate™ or any associated party from being a target for any information related to the user’s private keys. The voice and IM keys are generated per session by the Pryvate™ application on the user’s device and are discarded at the end of the session. The email application private keys are held on the device.

Pryvate Anti-Blocking

Pryvate™ has developed a VoIP anti-blocking solution for users who wish to bypass illegitimate firewall restrictions on 3G networks.


Numerous Countries block voice-over-internet protocol (VoIP) calls as they are seen as a:

  • Drain on the revenue of their telecommunications companies
  • Way of evading the control of governments and their security services
  • Setup statistic collection system for every call made through the app.

When making a call, a ‘session initiation protocol’ (SIP), is used to allow two endpoints to shake hands – then a ‘real-time transport protocol’ (RTP) carries the traffic. Our system works in real time by ‘tunneling’ the SIP and RTP traffic into a single encrypted HTTPS connection, using flexible virtual tunneling architectures to achieve seamless voice and video calls.

We utilize a ‘tunnel client library’ that is integrated into the user’s Apple or Android device and a tunnel server that is deployed inside Pryvate’s network infrastructure. The tunnel server uses the data of each secure connection to recreate the SIP and RTP traffic from the client’s smartphone.

Its principle is tunneling all SIP and RTP traffic through a single secure https connection up to a detunnelizer server. Our solution comprises:

We tunnel all SIP and RTP traffic through a single, secure https connection up to a detunneliser server. Our solution comprises:

  • A tunnel client library integrated into the Pryvate client for iPhone or Android
  • A tunnel server is deployed inside our network infrastructure
  • The tunnel server re-creates the SIP and RTP traffic from the data of each secure connection to the clients
  • Our client and server software is optimized to minimize latency inherent in TCP encapsulation of VoIP traffic.

It is not just a general purpose VPN.

Pryvate Key Management

Pryvate’s™ front end applications will be supported by a backend registration service for voice and instant messaging, user presence and availability information. Key servers will be established for the email application, storing and synchronising keys within the PRYVATE TECHNOLOGIES Ltd network.

Anonymous browsing is achieved through a network of globally distributed servers that randomly route traffic through the network, between the user’s device and the destination internet site, anonymising the source address on each hop.

The backend services are supplied by PRYVATE TECHNOLOGIES Limited’s server pools, which will initially be a single site service that will be expanded to a globally distributed service. The global service rollout will have no impact on the customer experience as the distribution of traffic to the various geographical services will be handled through DNS and will require no changes to the applications.

Initially the DNS services will be supplied through a third party, but an internal DNS service will be set up before switching all device traffic to the PRYVATE TECHNOLOGIES Ltd network. The decision to switch will be based upon the number of customers, the types of service in use and the cost and maintenance of a global server network to service the customer base.

city-background
Buildings1

PRICING & PACKAGES

Pryvate App Variations

Pryvatenow App
Pryvate Now Network Yes
Own Server No
Call To/From Pryvate Now Yes
Shared Address Book No
Admin Control No
Remote Wipe No
Audit Logs No
Charge* Free
Charge Method N/A
SME
Pryvate Now Network Yes
Own Server No
Call To/From Pryvate Now Yes
Shared Address Book No
Admin Control Yes
Remote Wipe Yes
Audit Logs No
Charge SME upto 50 @ £2.50
Charge Method Subscription*
Enterprise Light
Pryvate Now Network Sub Group
Own Server No
Call To/From Pryvate Now No
Shared Address Book Yes
Admin Control Yes
Remote Wipe Yes
Audit Logs Some Reports
Charge* £4.99
Charge Method Auto Pre-Pay
Enterprise
Pryvate Now Network No
Own Server Yes
Call To/From Pryvate Now No
Shared Address Book Yes
Admin Control Yes
Remote Wipe Yes
Audit Logs Yes
Charge* Server Cost
Charge Method Custom
* Charge per user per month

Pryvate Now Packages

Pryvatenow App
Features:
Secure Instant Messaging
Group Chat / Secure Calls
Conferencing / Secure Email
Secure Video / Secure Browsing
Secure File Storage
Number of Users Price
All User Amounts FREE
DOWNLOAD
SME
Features:
Same as base package plus Admin Control and Remote Wipe
Closed User Group for any number of users (Android/iOS)
Price is per user, per month billed annually in advance
Number of Users Price From
Up to 50 £2.50
51-250 £2.15
251-500 £1.85
501-1000 £1.40
1000+ £1.00
CONTACT US
Enterprise Light
Features:
Same as SME package plus Shared Address Book, Basic Audit Log Functionality and Sub Groups

Closed User Group for any number of users (Android/iOS)
Number of Users Price
Up to 50 Contact for quote
51-250 Contact for quote
251-500 Contact for quote
501-1000 Contact for quote
1000+ Contact for quote
CONTACT US
Enterprise
Features:
Same as Enterprise Lite package plus Own Server Pryvate Secure Cloud and Full Audit Log Functionality
Closed User Group for any number of users (Android/iOS)
Number of Users Price From
Up to 50 Contact for quote
51-250 Contact for quote
251-500 Contact for quote
501-1000 Contact for quote
1000+ Contact for quote
CONTACT US
  • Pryvate Now Network: Accounts held and communications initiated via Pryvate Now Network.
  • Own Server: Communication hub and database of Accounts on individual Server.
  • Call to/from Pryvate Now: Ability to call and receive calls to/from Standard Pryvate Now users.
  • Shared Address Book: Address book shared and accessible by rest of Team/Community/Corporation.
  • Admin Control: Admin account can manage accounts (Add/remove) plus further actions.
  • Remote Wipe: Ability to initiate remote wipe of data of accounts.
  • Audit Logs: Reports and Logs, listing usage of Calls and Messages/Emails.
  • Charge: Cost normally per user per month, Server costs applicable for Pryvate CUG.
  • Charge Method: Glossary of terms.
Pryvate CUG also comes with enhanced 24/7 Support and Monitoring of your services.

Pryvate CUG versions (3+4) include optional Integration with Pryvate SMC (Secure Manage Conversation) allowing access to increased functionality;
  • Call Recording
  • Accurate transcription, Indexing, Timestamping and Search
  • Customised Redaction of Personal Identifiable Information. (PII) across voice/data
  • Storage efficiency through the option to delete or archive
Further optional Integration with Pryvate PCS (Privacy Compliance Solution) which initially involves an analysis of your current Comms, will ensure a fully audited communications with compliance (MiFID II, HiPAA, GDPR) across all communication channels.

Pryvate CUG also available as “White Label”, administrative Management across one group, or multiple smaller groups, we can also integrate with your back-end systems Social Media channels, Databases etc.
Buildings1

PRYVATE NOW SOLUTIONS

Secure Managed Conversation (SMC)

Securely Manage Voice and Data conversations using SMC

Cloud based ( on-premise by request) :

Accurate transcription, Indexing, Time stamping and Search
Customised Redaction of Personal Identifiable Information(PII). across voice/data
Storage efficiency through the option to delete or archive
Search functionality for transcription
Simple locate/retrievals & removal/redaction of private information
Regulatory compliance such as:
MiFID II
HiPPA
GDPR

Our integrated technology gives you accurate voice to text transcription and indexing regardless of compression codec. Fully compliant with today’s government & regulatory landscape whilst also enabling your data channels emails sms etc to be encapsulated for ease of management and security.

Secured by Pryvate our technology that can unlock the value from your voice data files whilst ensuring compliancy with regulatory standards with our redaction capabilities enabling you to save storage by selectively removing unnecessary data, rep as well as ensure you remain compliant with data regulations.

Powered by transformative Al technology , we provide adaptable search, translation, accurate time stamping, redaction and tagging capabilities for your call recordings, dictation files and other data channels. Simplify, save effort, time and money.

LEARN MORE

Pryvate Messenger SME

The only fully containerised secure communications solution. Enabling businesses to remain GDPR compliant whilst giving their workforce and customers the freedom to chat, call, video, message and exchange sensitive files and photographs in complete privacy.

Protect your business , your clients and your data !

LOGIN SIGN UP

Closed User Groups (CUG)

An on Line/hosted Close User Group (CUG) Service with auditing capabilities that include Portal and mobile applications.


An Eyes on GDPR, Auditable, Secure Comms Solution for Your Organisation with the ability to utilize our SMC service, providing full transcription of all Voice/video calls.


Add a CUG system for Ultimate Audit ability and security.

Pryvate CUG adds military grade encryption to your company’s DNA

Pryvate CUG is a fully managed secure communications solution providing security variant protocols with the ability for your Organisation to have Eyes On audit across the Communications to impenetrably secure all of your communications across your ingress/egress traffic including mobile.
At last, a solution that adapts to integrate with your chosen VOIP & Mobile infrastructure to enable high-end communications privacy through hardened call encryption within your business desk-phones and mobiles; as well as allowing for 3-layer encryption between you and your clients. Together with our anti-blocking technology, calls can now be truly private and immutable (no matter what country you are located).

Integrate Pryvate’s CUG with your back end systems Social Media channels, DB etc.

Lockdown your communications with confidence!

All emails, messages, video calls, voice & conference calls can now be secured against all external entities and malicious actors, including hackers. Now ast last you can be in control your Company’s data, wipe lost phones, audit users behavior and conversations. Own your data with the ability to edit and hear across the entire network of users .

  • Our online Closed User Groups (CUGs) inter-user communication service using our Pryvate Secure mobile application (iOS or Android) applications.
  • The services to the CUG’s end users will be identical to the existing Pryvate application: voice and video calls, and chat service (with exclusion of EMAIL) - communications limited to other members of the same group.
  • The services to the CUG administrator consist in the ability to create, edit and delete users and to view their chat conversations (one to one discussions /IM) with call recordings easily transcribed by adding Pryvate’s SMC service.
  • This service is deployed inside the Pryvate network infrastructure to benefit from the existing communications network architecture without the need for own network and therefore network associated costs.

Includes:

  • A hosted/online Pryvate administrator portal where the Pryvate admin can create a new CUG (online) by specifying a name for the group, the number of users and an administrator username and password. The number of users can be changed after the CUG is created but can only be increased.
  • A hosted/online Web portal where CUG administrator can login (with administration credentials created by Pryvate) and manage their own users based on the functionalities detailed below. They can also see the content of chat conversations of his users (limited to one to one, text only, conversations) and have ears on all audio calls. They will also see a transcript ID they can reuse to locate the transcription in SMC service.
  • The ability to register users within the CUG using personal codes generated by the portal instead of the traditional OTP over SMS and interact with other users of the same CUG that they can see in their address book.
  • Integrated solution into our existing Pryvate network infrastructure used as the communication layer. Communications are limited to same group members.


Pryvate Portal -> Ability for Pryvate admin to create CUGs

An internet accessible (online / hosted) Pryvate admin portal with the ability for your Pryvate administrator to manually create / edit / delete CUGs

  • A single administrator username and password to be sent to CUG manager by external means.

Note: The number of users can only be increased (or decreased but not lower than the number of already created users in that CUG)


CUG user management portal
  • An online / hosted web portal accessible by a single admin, created on the Pryvate portal.
  • Ability to create, view, delete, update users
  • Under each user will appear:
    • List of call recordings (incoming and outgoing) of successful calls (updated at the end of calls provided the network connection is available at this time) with:
      • Remote number
      • Call direction (outgoing/incoming)
      • Date of call start
      • A download button that triggers the recording download as an Audio file (not transcript)
      • The transcription ID provided by the return from the SMC Portal
    • List of one-to-one conversations (updated when a text message is sent provided the network connection is available at this time) limited to text messages (all attachments available by custom request) with:
      • Remote number
      • Date of last message
      • A download button that triggers the conversation download as text file.
  • Automatic submission of Audio file (as received from the app without any format change) to SMC Portal.

Note: Further local/remote deletion of chat messages in applications are not replicated to server.


CUG Apps auditing functions:

Call recording and chat transcript upload (one to one, text only ( Unless by Custom build request) automatically:

  • Call Recording of all calls without user interaction or ask including the video if user makes video.
  • Recording upload to portal upon successful call end (provided network connection is available at this time).
  • Upload of text messages sent into one to one conversations when a text message is sent to server (e.g. delivered to server for sent ones, and provided a network connection is available at that time) to any user.
  • Upload of text messages received into one to one conversations when a text message is received from server (provided a network connection is available at that time) received from any user.


If taking the SMC option to transcribe voice messages, these are done in English as standard voice to text. Premium option will transcribe voices to the different speakers on the call. Premium includes transcription in the following languages;

  • Arabic
  • Bulgarian
  • Catalan
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Farsi
  • Finnish
  • French
  • German
  • Greek
  • Hebrew
  • Hindi
  • Hungarian
  • Indonesian
  • Italian
  • Japanese
  • Korean
  • Latvian
  • Lithuanian
  • Malay
  • Mandarin Chinese, Simplified
  • Norwegian
  • Polish
  • Portuguese (Brazil)
  • Romanian
  • Russian
  • Slovak
  • Slovenian
  • Spanish
  • Swedish
  • Tamil
  • Telegu
  • Turkish

Message deletion (local and remote) are not propagated to server.


Seamlessly morph into your current architecture. Shown: SMC/CUG + three 3rd party custom solution options. Diagram is for illustrative purposes only, as each network is unique requiring further solution-variants.


CUG-diagram

OffNet Audit Report

Privacy Compliance Solution (PCS)

Nothing Defines comms management and control like PCS

Pryvate PCS initially involves an analysis OF YOUR current Comms

Pryvate PCS is a fully audited communications overhaul to ensure compliancy across all channels.

Pryvate PCS is a fully managed secure communications suite of solutions that provide security variant protocols with the ability to route , record, index & transcribe all communications across all your ingress/egress; This solution integrates with your existing choice VOIP & Mobile providers to enable Regulatory Compliance. A bespoke, communications solution allowing for MiFID II, HIPAA & GDPR compliance while still leveraging your current telephony/communication infrastructure. A mix of PCS/SMC/CUG Together with our anti-blocking technology, your comms are now truly private (not even Pryvate can ‘listen-in’) and immutable (no matter what country you are located).Along with a centralised ingress/egress data base for control.

Take the stress out of compliance whilst maintaining your budget!

PCS integrates Pryvate‘s own CUG & SMC products with a custom off-net recording solutions and time stamping, interfacing with your back end systems. e.g. CRM, Bloomberg Chat, Social Media channels, DB etc.

Lockdown your corporate communications with confidence!

All emails, chats, video calls, voice & conference calls can now be secured against all external entities and malicious actors, including hackers.

No need to change your PABX or VoIP provider! We seamlessly morph into your current architecture. Shown: SMC/CUG + three 3rd party custom solution options. Diagram is for illustrative purposes only, as each network is unique requiring further solution-variants.

Pryvate Medical

Pryvate have been providing secure communications and messaging solutions to businesses across the world for the past 6 years offering the highest levels of security and financial sector regulatory compliance.

Pryvate’s communication platforms are offered as an easy to use solution enabling business to get on with business without worrying about privacy and security. Pryvate takes care of it all.

Market leading security and encryption technologies enable business users, care workers, occupational therapists, social workers, nurses, doctors and consultants to easily communicate and safely exchange information through the convenience of a mobile app not only between the professionals but also between their patients and extended care communities.

Pryvate has inbuilt the levels of security and data privacy safeguards you need to exceed relevant data privacy regulations and security standards.

Securing your Voice ,Video, Chat, IM, EMAIL, Secure Browsing across the internet, with secure file transfers across pics/video/word/xls etc. from your mobile device and desktops (coming soon )

Prylite

Prylite is an affordable solution that enables clients to add a secure chat messaging capability to their web app.

It allows users authorised by the client to enjoy secure chat messaging.

User groups can be established and the solution stores and delivers chat messages sent to an authorised recipient on subsequent next log in if they happen to be offline when the chat message is sent.

Dependent on the client requirements there is an extensive range of additional options and features that can be included with this solution

Buildings3

Applications

Personal

XMLID_2837_

Concerned parents and partners

Pryvate is great for any individuals who would want to make sure that communications with their loved ones is not subject to criminal prying or hacking.

joystick

Gamers

Gamers can rely on the added security offered by Pryvate to Identity Protection as well as secure and authenticated communication.

XMLID_452_

High Profile Individuals

All individuals whose career or status affords them a visible public profile (e.g., media/sports, professionals), and thus have a heightened risk of being targeted and hacked.

Business

law

Professional Services Providers

A lawyer may use Pryvate to communicate with his / her clients. The level of confidentiality required when communicating is high, as details of these conversations.

icon-hand

Wealth Managers

Wealth Managers / Private bankers / investment bankers may use the Pryvate platform to not just keep their dealings private but can also use the notarization as proof of moment of a transaction.

shield

Law Enforcement & Security Providers

Policemen, Security guards, and other security service providers needing to coordinate with their colleagues in the utmost secure way.

Industry

accounting

Accounting / Finance

Wealth Managers / Private bankers / investment bankers may use the Pryvate platform to not just keep their dealings private but can also use the notarization as proof of moment of a transaction.

work

Legal & Professional

PryvatePro LEGAL is designed for Attorneys and clients; features Military - Grade - Encryption services for voice, chat, video calls, group voice calls, email, file-sharing.

factory

IND. Manufacturing

Private Corporations who seek to install a low-cost and secure communications platform amongst their professionals to ensure that their employees are communicating in a secure and low cost.