Frequently Asked Questions


We have collated a list of frequently asked questions about KryptoPhone X and it's secure communication suite and same has been put up below. If you have question about KryptoPhone X or anything related to it, mostly likely you would find an answer to your question below. If you don't get an answer in the FAQs, feel free to write to us and we will respond back as soon as possible.

FAQs

1What is KryptoPhone X?

KryptoPhone X is an encrypted smartphone based on the new iPhone SE 2020 customized with highest security configuration, hardened OS and secure communication suite pre-installed enabling users to make encrypted voice and video calls, exchange encrypted text and multimedia messages, share files in a secure manner, etc.

2What are the main features of KryptoPhone X?

Key features of KryptoPhone X are encrypted voice and video calling, encrypted instant messaging, and secure file sharing.

3Which phone model is KryptoPhone X based on?

KryptoPhone X is based on the new iPhone SE 2020 model.

4Do I need to be connected to Internet to use KryptoPhone X?

Yes, a working internet connection is a must to use KryptoPhone X. KryptoPhone X bypasses the public telephone network system and instead uses it's private network to transfer communication packets.

KryptoPhone X essentially uses Voice Over Internet Protocol for calling features, so Internet is a basic need for calls and messages to work on KryptoPhone X.

5Does the other person also need to have KryptoPhone X?

Yes. For two parties to communicate in a secure manner using KryptoPhone X, both need to be on KryptoPhone X.

KryptoPhone X creates an encrypted tunnel between two parties and all the communication takes place through this secure tunnel. Therefore, for a complete security and privacy, both parties need to be using KryptoPhone X.

6Can I call a normal phone number using KryptoPhone X?

You can call a normal phone from your KryptoPhone X but the call would only be partially encrypted since the other party is not on KryptoPhone X.

However, your caller ID won't be displayed when making calls to normal phone numbers. A random caller ID would be displayed each time you make a call to normal phone number from your KryptoPhone X.

It is recommended that both parties be on KryptoPhone X to have a complete encryption for a seamlessly secure and private call.

7How is KryptoPhone X different from a normal smartphone?

KryptoPhone X is different from of-the-shelf smartphones available in the market in many ways. KryptoPhone X device is customized having hardened operating system and high security configuration implemented and factory apps removed.

Moreover, the KryptoPhone X device comes with pre-installed secure communication suite that enables users to make encrypted voice and video calls, exchange encrypted text and multimedia messages, allow encrypted file sharing among the peers.

The secure communication suite in the KryptoPhone X uses multiple levels of encryption algorithms and security protocols to maximize the security and privacy of the communication channels.

8Can I make voice/audio calls with KryptoPhone X?

Yes! You can make encrypted voice calls with KryptoPhone X.

9Can I make video calls with KryptoPhone X?

Yes! You can make encrypted video calls with KryptoPhone X.

10Can I have more than one participant in a voice/audio call?

Yes! You can make an encrypted voice call with up to 5 participants in it.

11Can I send messages using a KryptoPhone X?

Yes. You can send and receive encrypted text and multimedia messages to your peers also using KryptoPhone X.

12Is group messaging supported on KryptoPhone X?

Yes. You can create chat groups on KryptoPhone X and add up to 999 participants to it.

13Does KryptoPhone X support self-disappearing messages?

Yes. With KryptoPhone X you can send self-destructing messaging with specified time limit.

14What type of files can I share on KryptoPhone X?

You can share below mentioned file types in a secure manner using KryptoPhone X:

  • Photos
  • Videos
  • Documents
  • Recorded Voice Notes
  • Location
  • 15Will I be notified if a message is copied or forwarded by the recipient?

    You will be notified with an alert when the recipient of the message, either in one-to-one chat or group chat, copies or forwards the message.

    16Will I know if someone takes a screenshot of the chat?

    Yes. KryptoPhone X has a feature wherein the users are notified with an alert when someone in the chat takes a screenshot of the chat. The feature is available in both one-to-one and group chats.

    17Can we deploy KryptoPhone X solution on-premise?

    Yes it is possible to have an on-premise version of KryptoPhone X solution. If you are a government entity or a corporate with substantial budget for this project, we would help deploy on-premise version of KryptoPhone X.


    1Does KryptoPhone X use an End-to-End Encryption (E2EE)?

    Yes. KryptoPhone X uses genuine end-to-end encryption to secure communication on its platform.

    2What kind of encryption is used on KryptoPhone X?

    KryptoPhone X uses a combination of different encryption algorithms to maximize the security on the platform.

    KryptoPhone X uses:
    1.) Military-grade Asymmetric Encryption elliptic curve SEC521R1 which is equivalent to RSA 16384-bit encryption.
    2.) Military-grade Symmetric Encryption with double layer of AES-256 and CHACHA20-256 with a combined total key length of 512-bits.
    3.) Military-grade Encrypted Local Storage with double layer of AES-256 and CHACHA20-256 with a combined total key length of 512 bits.

    3Is my identity hidden while using KryptoPhone X?

    Yes. KryptoPhone X has an integrated Secure VPN for additional encryption (AES-256) that hides the original IP address and traffic routes of the user.

    4What is the authentication mechanism on KryptoPhone X?

    KryptoPhone X uses a double layer of authentication employed using Elliptic Curve Signature (ECSDA) and Time One Time Password (autogenerated TOTP).

    5Can I wipe the data on KryptoPhone X?

    Yes. There is a panic password using which you can wipe the content on your KryptoPhone X device.

    6Does KryptoPhone X have any security updates?

    Yes. Periodic security updates on KryptoPhone X are guaranteed for 5 years.


    1Where can I buy KryptoPhone X?

    You can buy KryptoPhone X from our official website, through one of our resellers, partners, or affiliates.

    To purchase KryptoPhone X from our official website, please click here.

    2Are there any recurring subscription charges for KryptoPhone X?

    No, there are no recurring subscription costs for KryptoPhone X. The secure communication suite in KryptoPhone X comes with a lifetime subscription with unlimited usage.

    3Are calls to normal phone numbers included in the lifetime subscription?

    To make calls to normal phone numbers from KryptoPhone X, you would need to top-up your account with some credit. However, for secure calls between two KryptoPhone X users, there is no need for any additional credit.

    4What payment methods are accept to purchase KryptoPhone X?

    You can make the payment to buy KryptoPhone X using PayPal including credit and debit cards. Cryptocurrency payments are also accepted.

    5How long does take to deliver KryptoPhone X?

    Your KryptoPhone X would be delivered to you within two working days from date of placing the order.

    6Can I purchase KryptoPhone X anonymously?

    We can deliver an anonymous package with invoice and shipment 
from trading companies located in Europe, USA or Far-East

    7How would KryptoPhone X be delivered to me?

    KryptoPhone X is delivered to customers through international courier services such as DHL, Fedex, UPS, etc.

    8Do I have to pay extra delivery or shipping charges?

    No. There are no extra delivery charges to be paid by the customer.

     

    The new KryptoPhone X - Smart, Stylish and Secure


    The new KryptoPhone X is based on iPhone SE red and enables users to communicate in a secure and private manner. The secure communication suite in KryptoPhone X uses multiple layers of encryption and security protocols to maximize the security of the communication channels.

    Buy Now