<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Crypho — End-to-end encrypted file sharing and messaging</title>
    <link>https://www.crypho.com/index.xml</link>
    <description>Recent content on Crypho — End-to-end encrypted file sharing and messaging</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 23 Mar 2016 21:54:54 +0100</lastBuildDate>
    <atom:link href="https://www.crypho.com/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Using Crypho</title>
      <link>https://www.crypho.com/documentation/using-crypho.html</link>
      <pubDate>Wed, 23 Mar 2016 21:54:54 +0100</pubDate>
      
      <guid>https://www.crypho.com/documentation/using-crypho.html</guid>
      <description>

&lt;h4 id=&#34;using-crypho&#34;&gt;Using Crypho&lt;/h4&gt;

&lt;p&gt;Crypho is a messaging and sharing tool for people and organisations with high security requirements. It provides an easy to use chat and file sharing application that helps teams communicate confidential information easily.&lt;/p&gt;

&lt;p&gt;Crypho is a Software-as-a-Service, free for personal use and paid for businesses and professionals.
You can use Crypho through a normal web-browser or on your mobile device of choice. No pre-installation of software, firewall-configuration or key exchange is necessary.&lt;/p&gt;

&lt;h4 id=&#34;crypho-is-end-to-end-encrypted&#34;&gt;Crypho is end-to-end encrypted.&lt;/h4&gt;

&lt;p&gt;This means that when you send messages or share files through Crypho, your data is encrypted before it leaves your computer. The encryption is done with keys shared by only you and the message recipient. Only the recipient with the correct keys can decrypt the information shared. No one else can access your messages and files — not even Crypho staff. It is impossible for Crypho to get access to your information or to grant others access to your information.
For a more in-depth look at the security design, have a look at our &lt;a href=&#34;https://www.crypho.com/documentation/security.html&#34;&gt;technical security page&lt;/a&gt;.&lt;/p&gt;

&lt;h4 id=&#34;crypho-is-private&#34;&gt;Crypho is private&lt;/h4&gt;

&lt;p&gt;Crypho is private and confidential by default. Crypho does not share or publish information about you like other applications or social networks do.&lt;/p&gt;

&lt;h4 id=&#34;core-functionality&#34;&gt;Core functionality&lt;/h4&gt;

&lt;p&gt;Crypho is group messaging and file sharing.
You can chat with your contacts directly or in groups. You can share files directly in the chat or keep a shared folder of files between two people or for a group. Only the people explicitly granted access can view or download the files. All files and messages are strongly encrypted and never available to anyone else.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Logging in</title>
      <link>https://www.crypho.com/documentation/logging-in.html</link>
      <pubDate>Sat, 04 Apr 2015 15:29:29 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/logging-in.html</guid>
      <description>

&lt;p&gt;Crypho&amp;rsquo;s primary focus is the confidentiality of your data. Because of the high security focus, logging in requires two-factor authentication and a strong passphrase.&lt;/p&gt;

&lt;h4 id=&#34;crypho-s-login-form&#34;&gt;Crypho&amp;rsquo;s login form:&lt;/h4&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/documentation/loginform.png&#34; alt=&#34;loginform&#34; /&gt;&lt;/p&gt;

&lt;p&gt;It requires your email address, your passphrase and a time based security code.&lt;/p&gt;

&lt;h4 id=&#34;your-passphrase&#34;&gt;Your passphrase&lt;/h4&gt;

&lt;p&gt;You created your passphrase when you signed up. Take special care of your passphrase. It is the basis for your cryptographic keys, and instrumental to the security of the application.&lt;/p&gt;

&lt;h4 id=&#34;two-factor-authentication-code&#34;&gt;Two-factor authentication code&lt;/h4&gt;

&lt;p&gt;In addition to the passphrase, you also need a time based security code for Crypho&amp;rsquo;s two-factor authentication. The two-factor authentication ensures that even if someone gets hold of your passphrase, they still cannot access your account. In addition to something you know (your passphrase) you also need something you &lt;em&gt;have&lt;/em&gt; (usually your phone or your computer).&lt;/p&gt;

&lt;p&gt;There are several ways of generating the security code:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The security code can be generated on your phone from the Crypho mobile app.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The security code can be generated on your phone from one of many available authenticator apps supporting TOTP, for example Google Authenticator.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The security code can be sent you your phone as a notification, as long as you have the Crypho app installed and linked. To do this, click the &lt;em&gt;&amp;ldquo;send code via App&amp;rdquo;&lt;/em&gt; button on the login form.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The security code can be sent you by SMS/Text message. To do this, click the &lt;em&gt;&amp;ldquo;send code via SMS&amp;rdquo;&lt;/em&gt; button. An SMS with a six digit security code should arrive in seconds. Enter the six digits in the field and press &lt;em&gt;Log in&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The security code is also displayed inside the mobile app. Both on the login page (for those that have autologin disabled) and at the very top of the preferences page.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The security code is valid for 60 seconds. If you wait too long, you will have to request a new code.&lt;/p&gt;

&lt;h4 id=&#34;remember-me&#34;&gt;Remember me&lt;/h4&gt;

&lt;p&gt;By checking the checkbox &lt;em&gt;Remember this computer for two weeks&lt;/em&gt; Crypho will not require a security code for the next two weeks for that computer.&lt;/p&gt;

&lt;h4 id=&#34;forgot-your-passphrase&#34;&gt;Forgot your passphrase&lt;/h4&gt;

&lt;p&gt;If you cannot remember your passphrase, click the &lt;em&gt;Lost your passphrase&lt;/em&gt; link and follow the instructions.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Key recovery</title>
      <link>https://www.crypho.com/documentation/recovery-keys.html</link>
      <pubDate>Fri, 20 Jan 2017 13:00:00 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/recovery-keys.html</guid>
      <description>

&lt;p&gt;It is easy to either forget your passphrase or lose access to your 2-factor authentication codes.&lt;/p&gt;

&lt;p&gt;To regain access to your account without losing your existing content and contacts, you can use a recovery key. The key must be generated up front.&lt;/p&gt;

&lt;p&gt;The recovery key is a 256 bit key printed in the form of 24 words. It can be used to recover your account should you forget your passphrase.&lt;/p&gt;

&lt;p&gt;Here&amp;rsquo;s an example of how it might look:&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;recoverykey.png&#34; alt=&#34;Example Recovery Key&#34; /&gt;&lt;/p&gt;

&lt;h4 id=&#34;creating-your-recovery-key&#34;&gt;Creating your recovery key&lt;/h4&gt;

&lt;p&gt;You can create a recovery key by selecting &amp;ldquo;Key recovery&amp;rdquo; in the menu in the Crypho desktop or web apps. It is not  possible to create recovery keys from the mobile app.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;key-recovery-menu.png&#34; alt=&#34;Key Recovery menu entry&#34; /&gt;&lt;/p&gt;

&lt;p&gt;It is only possible to have one recovery key available at any time. Creating a new recovery key instantly invalidates all previously generated recovery keys. &lt;/p&gt;

&lt;p&gt;The new recovery key will only be shown to you once. There is no way to access it again. We recommend that you write it down or print it on paper. Store your key in a safe place, for example in an envelope in a safe or bank deposit box. Do not store it digitally. And make sure no-one else gets access to it. &lt;/p&gt;

&lt;p&gt;Should you forget your passphrase or lose your two-factor authentication mechanism in the future, you will then be able to use this key to recover your account.   &lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Contacts</title>
      <link>https://www.crypho.com/documentation/contacts.html</link>
      <pubDate>Tue, 29 Mar 2016 11:48:19 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/contacts.html</guid>
      <description>

&lt;p&gt;Using Crypho, you communicate either directly with your contacts or in groups. To add a contact, you must invite them to be your contact and they must approve your contact request. You can only be made someone&amp;rsquo;s contact by explicit approval. Your contacts are listed in your main Crypho home screen. Only you can see who your contacts are. They are not shared with others.&lt;/p&gt;

&lt;h4 id=&#34;inviting-a-contact&#34;&gt;Inviting a contact&lt;/h4&gt;

&lt;p&gt;To add a contact, click the add contact button in the main contact listing screen. You will be given the opportunity to enter their email address and a personal message. An invitation email will be sent them inviting them to be your contact in Crypho. If they don&amp;rsquo;t have an account already, they will have to join first in order to accept your invitation.Your personal message will be sent as part of the invitation email to them. Once they choose to accept your invitation, they will appear in your contacts list and you will appear as a contact in their list.&lt;/p&gt;

&lt;h4 id=&#34;the-invitations-menu&#34;&gt;The invitations menu&lt;/h4&gt;

&lt;p&gt;In the &amp;ldquo;invitations&amp;rdquo; entry in the top menu, you can see you sent and received invitations. The counter on the main menu entry shows the number of received invitations you have not yet responded to. The menu has two entries.&lt;/p&gt;

&lt;h4 id=&#34;received-invitations&#34;&gt;Received invitations&lt;/h4&gt;

&lt;p&gt;a list of invitations received from others, each invitation with an option to accept or reject it. Rejecting an invitation throws it silently away without alerting the person that invited you.&lt;/p&gt;

&lt;h4 id=&#34;sent-invitations&#34;&gt;Sent invitations&lt;/h4&gt;

&lt;p&gt;Shows a list of invitations that you have sent to others. Each invitation has the option to withdraw the invitation by clicking the x next to it. This also silently deletes the invitation, and does not send a notification to the recipient.&lt;/p&gt;

&lt;h4 id=&#34;deleting-a-contact&#34;&gt;Deleting a contact&lt;/h4&gt;

&lt;p&gt;To delete a contact, click on them in the main list so you can view the conversation with them. In the bottom right corner of the chat is a button saying &amp;ldquo;delete contact&amp;rdquo;. Clicking this will delete them from your contacts, and you will be removed from their contact list as well.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Sharing files</title>
      <link>https://www.crypho.com/documentation/files.html</link>
      <pubDate>Fri, 29 Apr 2016 11:51:01 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/files.html</guid>
      <description>

&lt;p&gt;All members of a group conversation can share files and delete files in the group&amp;rsquo;s shared folder.
Share files either by dragging and dropping them on the main chat conversation or by clicking the upload files button in the file overview screen.&lt;/p&gt;

&lt;p&gt;If the shared file is an image, a thumbnail of the image will be generated and displayed. For any security conscious people out there, it might be comforting to know that the thumbnail is generated on the client while uploading. Generating thumbnails on the server is of course impossible, as all files are encrypted before they reach Crypho&amp;rsquo;s server.&lt;/p&gt;

&lt;h4 id=&#34;viewing-shared-files&#34;&gt;Viewing shared files&lt;/h4&gt;

&lt;p&gt;When someone shares a file in a conversation, it is immediately displayed in the chat and available for download. Clicking a file icon or thumbnail immediately downloads and decrypts the file to make it available to you.&lt;/p&gt;

&lt;p&gt;All the shared files can also be seen in the &amp;ldquo;shared files&amp;rdquo; panel. Delete files in the shared files panel by clicking the trash icon.&lt;/p&gt;

&lt;h4 id=&#34;file-size-limits&#34;&gt;File size limits&lt;/h4&gt;

&lt;p&gt;File uploads have a max size depending on your account plan. Free account can share files up to 3 megabytes. Paid accounts can share files up to 100 megabytes, depending on plan size.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Groups</title>
      <link>https://www.crypho.com/documentation/groups.html</link>
      <pubDate>Tue, 29 Mar 2016 11:49:49 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/groups.html</guid>
      <description>

&lt;p&gt;A group is a persistent chat room with a shared file folder that is available exclusively to invited members of the group. Groups are never announced publicly or visible to anyone beyond its members. Only invited members have access to the group conversation, know of its existence, and see who else is a member.&lt;/p&gt;

&lt;h4 id=&#34;chatting-in-groups&#34;&gt;Chatting in groups&lt;/h4&gt;

&lt;p&gt;All members of the group have access to the group chat. All members receive notifications (on mobile) for new messages when a message is posted if they are not logged in at the time.&lt;/p&gt;

&lt;h4 id=&#34;muting-a-group-mobile-only&#34;&gt;Muting a group (mobile only)&lt;/h4&gt;

&lt;p&gt;If you prefer not to receive mobile notifications from a particular group conversation, you can select to mute the group:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Visit the group with the mobile app&lt;/li&gt;
&lt;li&gt;Click the cog icon in the top right corner of the screen&lt;/li&gt;
&lt;li&gt;Choose &amp;ldquo;mute group&amp;rdquo; in the menu that appears&lt;/li&gt;
&lt;/ol&gt;

&lt;h4 id=&#34;creating-a-group&#34;&gt;Creating a group&lt;/h4&gt;

&lt;p&gt;To create a group, click the “Create group” button in the main screen. You will be presented with a panel that allows you to choose among your contacts who to add to the group. If you want to invite people to the group that are not your contacts, invite them to be your contacts first.
The members field has a search. Start typing, and you will immediately be presented with matches among your contacts. Clicking a contact immediately adds them to the group.&lt;/p&gt;

&lt;h4 id=&#34;leaving-a-group&#34;&gt;Leaving a group&lt;/h4&gt;

&lt;p&gt;To leave a group, click the &amp;ldquo;leave group&amp;rdquo; button inside the group chat.
If you are the group owner, you cannot leave a group, only delete it.&lt;/p&gt;

&lt;h4 id=&#34;group-roles&#34;&gt;Group roles&lt;/h4&gt;

&lt;p&gt;The person that initially created the group conversation is designated the &lt;em&gt;owner&lt;/em&gt;, indicated by a star in the roster. The owner can invite and remove members, rename the group and delete the group. The owner can also promote other group members to “operator”. Operators are indicated by a half star icon in the roster. Operators can also add and remove people to the group, rename the group. Only the owner can delete the group.&lt;/p&gt;

&lt;h4 id=&#34;renaming-a-group&#34;&gt;Renaming a group&lt;/h4&gt;

&lt;p&gt;To rename a group in the web app, simply click on its title when inside the group conversation and change the text. You must be operator or owner of the group to change its name.&lt;/p&gt;

&lt;h4 id=&#34;managing-members&#34;&gt;Managing members&lt;/h4&gt;

&lt;p&gt;Given that you have permission to manage a group&amp;rsquo;s members, clicking the members button brings up the member management menu. You can add existing contacts to the group, grant (or remove) group members operator role and evict members from the group.&lt;/p&gt;

&lt;p&gt;If you add a new member to a group, they will get access to the group immediately. They will also be able to see previous chat history and files that have been shared to the group.&lt;/p&gt;

&lt;h4 id=&#34;deleting-a-group&#34;&gt;Deleting a group&lt;/h4&gt;

&lt;p&gt;To delete a group, click the delete group button. Only the group owner can delete it. When a group is deleted, all chat history and all shared files are deleted permanently. Your contacts are still available as contacts.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Enterprise accounts</title>
      <link>https://www.crypho.com/documentation/administering-account.html</link>
      <pubDate>Sun, 29 Jan 2017 12:00:00 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/administering-account.html</guid>
      <description>

&lt;p&gt;Crypho offers a paid version for organizations and companies. It offers useful features for managing many users and company compliance.&lt;/p&gt;

&lt;h4 id=&#34;extra-features&#34;&gt;Extra features:&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Customers can share and store large files, up to 100mb. There is no limit on storage.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Customers can add as many groups they wish.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Customers can download transcripts of chats in plain text format. This can be useful for compliance or archiving purposes.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Customers are identified as professional users and have a badge indicating their organization/company in the member roster.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 id=&#34;managing-an-organizational-account&#34;&gt;Managing an organizational account:&lt;/h4&gt;

&lt;p&gt;The administrator of an organization account can add and remove people to the account.&lt;/p&gt;

&lt;p&gt;In the menu, select &amp;ldquo;My account&amp;rdquo;.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;account.png&#34; alt=&#34;&amp;quot;Account admin page&amp;quot;&#34; /&gt;&lt;/p&gt;

&lt;p&gt;The account overview includes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The company name. This will be shown on member rosters for all members of the account. &lt;img src=&#34;account-title.png&#34; alt=&#34;&amp;quot;Account admin page&amp;quot;&#34; /&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;A list of all members of the account. &lt;img src=&#34;account-members.png&#34; alt=&#34;&amp;quot;Account admin page&amp;quot;&#34; /&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;A form to add new members to the account &lt;img src=&#34;addmember.png&#34; alt=&#34;&amp;quot;Add member form&amp;quot;&#34; /&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
</description>
    </item>
    
    <item>
      <title>Verifying key fingerprints</title>
      <link>https://www.crypho.com/documentation/verify.html</link>
      <pubDate>Tue, 24 Jan 2017 11:48:19 +0200</pubDate>
      
      <guid>https://www.crypho.com/documentation/verify.html</guid>
      <description>

&lt;p&gt;Crypho’s end-to-end encryption protects your data from surveillance. For critical communications it is also important to be certain of the identity of the person you are talking to.&lt;/p&gt;

&lt;p&gt;By verifying each other’s encryption keys, you and the person with whom you are communicating add another layer of protection to your conversation by confirming each other’s identities. This makes you certain that you are always talking to the right person. Crypho makes it simple to manage key signing and verification.&lt;/p&gt;

&lt;h4 id=&#34;out-of-band-verification&#34;&gt;Out-of-band verification&lt;/h4&gt;

&lt;p&gt;When verifying keys, it is important that you actually check that you are communicating with the correct person. This is why verification should be done through a different medium than Crypho itself — called out-of-band verification.&lt;/p&gt;

&lt;h5 id=&#34;meet-in-person-and-verify&#34;&gt;Meet in person and verify&lt;/h5&gt;

&lt;p&gt;If it can be arranged safely and conveniently, the ideal way is to &lt;strong&gt;meet in person and verify keys face-to-face&lt;/strong&gt;. Crypho’s mobile app has convenient provisions for this: your key fingerprint is available as a scannable QR code, and scanning each other’s fingerprints is convenient and quick.&lt;/p&gt;

&lt;h5 id=&#34;verify-via-phone&#34;&gt;Verify via phone&lt;/h5&gt;

&lt;p&gt;If meeting in person is not an option, telephone is a good alternative. Talking on the phone makes it easy to confirm that you are talking to the correct person and not an impostor. Crypho has convenient six-word fingerprints that can easily be communicated over the phone and entered in the app for verification.&lt;/p&gt;

&lt;h4 id=&#34;viewing-your-own-key-fingerprint&#34;&gt;Viewing your own key fingerprint&lt;/h4&gt;

&lt;p&gt;The fingerprint appears as both a QR code and a list of six seemingly random words. The QR code and the list of words are equivalent. Both are a unique representation of your cryphographic keys. By sharing the QR code or the list of words with your contacts, they can enter it into their app so it can always be aware of any suspicious changes to your keys.&lt;/p&gt;

&lt;p&gt;Give your key fingerprint to your contacts in a medium separate from Crypho. In a manner where they can be sure it is really you.&lt;/p&gt;

&lt;h5 id=&#34;desktop-and-web&#34;&gt;Desktop and web&lt;/h5&gt;

&lt;p&gt;In the desktop or web apps, your key fingerprint is available through the menu under &amp;ldquo;My fingerprint&amp;rdquo;.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;fingerprint.png&#34; alt=&#34;&amp;quot;My fingerprint: desktop/web&amp;quot;&#34; /&gt;&lt;/p&gt;

&lt;h5 id=&#34;mobile&#34;&gt;Mobile&lt;/h5&gt;

&lt;p&gt;In the mobile app, your key fingerprint is available from the &lt;strong&gt;settings screen&lt;/strong&gt;.&lt;/p&gt;

&lt;h4 id=&#34;verifying-a-contact&#34;&gt;Verifying a contact&lt;/h4&gt;

&lt;h5 id=&#34;desktop-and-web-1&#34;&gt;Desktop and web&lt;/h5&gt;

&lt;p&gt;In the desktop or web apps, clicking the red circle next to a contact in the contact list brings up the key verification screen. Enter the six words that your contact has shared with you in the form. Your contact should now be listed as verified.&lt;/p&gt;

&lt;h5 id=&#34;mobile-1&#34;&gt;Mobile&lt;/h5&gt;

&lt;p&gt;In the mobile app, view a direct conversation with the contact you want to verify and press the cog symbol in the top right corner. In the menu that appears, select &amp;ldquo;Verify contact&amp;rdquo;.&lt;/p&gt;

&lt;p&gt;You have two options for verifying:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Scan your contact&amp;rsquo;s QR code fingerprint with your phone&amp;rsquo;s camera&lt;/li&gt;
&lt;li&gt;or enter your contact&amp;rsquo;s six word fingerprint when they share it with you.&lt;/li&gt;
&lt;/ol&gt;

&lt;h4 id=&#34;key-changes&#34;&gt;Key changes&lt;/h4&gt;

&lt;p&gt;If you have lost access to your account and reset your passphrase, new cryptographic keys will be created for you, and as a result you will also get a new fingerprint. ALl your existing contacts will be notified, and all verifications will be invalidated.&lt;/p&gt;

&lt;p&gt;Crypho detects when someone’s keys change - for example when they have lost and reset their password. Key verifications are automatically invalidated and must be verified again in this case.&lt;/p&gt;

&lt;p&gt;We recommend that you verify all your Crypho contacts.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Security in Crypho</title>
      <link>https://www.crypho.com/documentation/security.html</link>
      <pubDate>Tue, 22 Mar 2016 10:21:10 +0100</pubDate>
      
      <guid>https://www.crypho.com/documentation/security.html</guid>
      <description>

&lt;div class=&#34;well row&#34;&gt;
    &lt;div class=&#34;col-sm-10&#34;&gt;
    &lt;h4&gt;Download security whitepaper&lt;/h4&gt;
    &lt;p&gt;Download the Crypho security whitepaper in PDF format. No registration necessary.&lt;/p&gt;
    &lt;/div&gt;
    &lt;div class=&#34;col-sm-2&#34; style=&#34;text-align:center&#34;&gt;
    &lt;a href=&#34;https://www.crypho.com/crypho-security-whitepaper.pdf&#34; class=&#34;no-underline&#34;&gt;&lt;span style=&#34;font-size:500%; margin-left:15px&#34; class=&#34;fui-document&#34;&gt;&lt;/span&gt;
    &lt;br /&gt;Download&lt;/a&gt;
    &lt;/div&gt;
&lt;/div&gt;

&lt;h4 id=&#34;security-overview&#34;&gt;Security Overview&lt;/h4&gt;

&lt;p&gt;Crypho uses several layers of protection to provide privacy and security. All data should be end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There should be no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members’ keys.&lt;/p&gt;

&lt;h4 id=&#34;cryptography&#34;&gt;Cryptography&lt;/h4&gt;

&lt;p&gt;Crypho uses several well known and battle-proven encryption algorithms and libraries to ensure privacy:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ECC Encryption&lt;/strong&gt; The El-Gamal Elliptic Curve 384-bit prime curve is used.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AES&lt;/strong&gt; We use authenticated AES with 256-bit keys in CCM mode.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scrypt&lt;/strong&gt; We use the standard scrypt algorithm with N=16384, r=8, p=1.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Randomness&lt;/strong&gt; All random numbers/IVs/keys are generated by a derivative of the Fortuna algorithm found in the &lt;a href=&#34;https://crypto.stanford.edu/sjcl&#34;&gt;Stanford Javascript Crypto Library&lt;/a&gt;. The entropy generators are initialized with random numbers coming from the built-in strong cryptographic RNG of the browsers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Crypto primitives&lt;/strong&gt; All crypto primitives used by Crypho are based on the &lt;a href=&#34;https://crypto.stanford.edu/sjcl&#34;&gt;Stanford Javascript Crypto Library&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For an in-depth review of how Crypho uses cryptography for authentication, signing &amp;amp; encryption please see Crypho&amp;rsquo;s &lt;a href=&#34;https://www.crypho.com/crypho-security-whitepaper.pdf&#34;&gt;security whitepaper&lt;/a&gt;.&lt;/p&gt;

&lt;h4 id=&#34;authentication-two-factor-authentication&#34;&gt;Authentication &amp;amp; two-factor-authentication&lt;/h4&gt;

&lt;p&gt;Crypho uses the Time-based One-time Password Algorithm (TOTP) for two-factor authentication. Upon registration the server generates a TOTP secret. The member can then choose to use SMS/text messages to receive TOTP tokens, or to generate them through Crypho’s mobile app.&lt;/p&gt;

&lt;h4 id=&#34;web-app-security&#34;&gt;Web app security&lt;/h4&gt;

&lt;p&gt;Regardless of the encryption mechanisms described above, all communications between the Crypho servers and web browsers or mobile applications are encrypted using HTTPS/TLS (Transport Layer Security). While this makes no difference to the privacy of the data transmitted (since they are end-to-end encrypted) it helps further safeguarding client-server communications and mitigate man-in-the-middle attacks.&lt;/p&gt;

&lt;p&gt;Crypho pays close attention to security announcements on new vulnerabilities on the HTTPS/TLS protocols and adapts if necessary in a timely fashion.&lt;/p&gt;

&lt;p&gt;To protect users from cross-site scripting attacks (XSS), Crypho’s web app uses Content Security Policies to declare approved sources of content that are allowed to run in the Crypho web application.&lt;/p&gt;

&lt;h4 id=&#34;mobile-app-security&#34;&gt;Mobile app security&lt;/h4&gt;

&lt;p&gt;User interactions such as entering a long passphrase can be a challenge on mobile devices given their small form factor. To solve this problem Crypho developed a secure storage mechanism that uses native device security when available and complements it with strong cryptography when necessary.&lt;/p&gt;

&lt;p&gt;Thus we allow the member to authenticate without entering her passphrase every time, by cryptographically storing the her key pair on the device. The member can opt-out of this feature, in which case her passphrase will be required every time she uses the app. This is recommended in hostile environments.&lt;/p&gt;

&lt;p&gt;To enhance security and transparency, Crypho has released its &lt;a href=&#34;https://github.com/Crypho/com.crypho.plugins.securestorage/&#34;&gt;secure storage plugin&lt;/a&gt; as well as its &lt;a href=&#34;https://github.com/Crypho/com.crypho.plugins.scrypt/&#34;&gt;scrypt implementation for mobile&lt;/a&gt; as open source software on &lt;a href=&#34;https://github.com/Crypho&#34;&gt;Github&lt;/a&gt;.&lt;/p&gt;

&lt;h4 id=&#34;privacy-anonymity-and-metadata&#34;&gt;Privacy, anonymity and metadata&lt;/h4&gt;

&lt;p&gt;Crypho protects the contents of your conversations and files you share by end-to-end encrypting them with keys that are only under your control. Crypho is not anonymous. It aims to keep your data private, while providing all of the features expected by a communication service.&lt;/p&gt;

&lt;p&gt;For example, Crypho’s server is aware of when a new message is posted in a conversation and notifies users via the web or mobile notification system. Since Crypho does not have access to the contents of the conversations, it is impossible to include the content of the message in the notifications (which would’ve been a security risk in itself anyway).&lt;/p&gt;

&lt;p&gt;Our servers have no knowledge of your message contents, but stores things like your email address, your telephone number, your contacts in Crypho, the IP addresses you use. Crypho also stores additional data such as the time you logged-in, or when a message was sent and by whom.&lt;/p&gt;

&lt;p&gt;Crypho does not disclose any of this information or share it with third parties, except when needed in order to fulfill its operations.&lt;/p&gt;

&lt;h4 id=&#34;open-source-software&#34;&gt;Open Source software&lt;/h4&gt;

&lt;p&gt;Crypho is Open Source, so that both yourself and security experts can independently review the source code to confirm that it does what it should and does it the right way. This way the security community and can review Crypho continously, see that cryptography is used in the correct manner and that there are no back-doors or security holes.&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://github.com/Crypho&#34;&gt;Crypho&amp;rsquo;s source code on GitHub&lt;/a&gt;&lt;/p&gt;

&lt;h4 id=&#34;operational-security-hosting&#34;&gt;Operational security/hosting&lt;/h4&gt;

&lt;p&gt;Crypho maintains strict policies on operational security. All our code is peer-reviewed for security before deployment and we maintain a large number of automatic tests that target security specifically.&lt;/p&gt;

&lt;p&gt;No cloud services are used for hosting or storing of the user data. Crypho is hosted on dedicated servers in Norway in order to keep our infrastructure under strict control. All your data is protected by Norwegian law.&lt;/p&gt;

&lt;h4 id=&#34;responsible-vulnerability-disclosure&#34;&gt;Responsible vulnerability disclosure&lt;/h4&gt;

&lt;p&gt;We perform regular security audits internally and communicate regularly with security experts globally. Our engineering team has strong security-related background and experience. However, no software is without bugs. If a security vulnerability is found, Crypho will disclose all information relating to the bug after it is fixed. We strive for transparency and trust.&lt;/p&gt;

&lt;h4 id=&#34;data-ownership&#34;&gt;Data ownership&lt;/h4&gt;

&lt;p&gt;All information exchanged using Crypho’s service is owned by the members participating in the conversation. Crypho does not not claim any ownership of this data. Our architecture additionally makes it impossible for us to decrypt and access it.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Video and audio chat</title>
      <link>https://www.crypho.com/blog/2017-03-23-video.html</link>
      <pubDate>Thu, 23 Mar 2017 00:13:30 +0200</pubDate>
      
      <guid>https://www.crypho.com/blog/2017-03-23-video.html</guid>
      <description>&lt;p&gt;We are super thrilled to present the first release of encrypted video and audio chats in Crypho.&lt;/p&gt;

&lt;p&gt;Secure communications have never been this easy. You can now establish  encrypted video chats with your contacts at the click of a button. The security is handled by the existing, proven Crypho security model and all signaling,  audio and video is end-to-end encrypted.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/video_chat.png&#34; alt=&#34;video&#34; /&gt;&lt;/p&gt;

&lt;p&gt;Video and audio chats are available person-to-person, for the desktop and web platforms in this first release.
Group video conversations and mobile app support will be available in the future.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Image viewers</title>
      <link>https://www.crypho.com/blog/2017-03-10-image-viewer.html</link>
      <pubDate>Fri, 10 Mar 2017 00:14:30 +0200</pubDate>
      
      <guid>https://www.crypho.com/blog/2017-03-10-image-viewer.html</guid>
      <description>&lt;p&gt;On some platforms (most notably Android), using the built-in image viewer could cause a copy of a viewed image to be stored on your device. This could cause additional risks to some of our customers.&lt;/p&gt;

&lt;p&gt;We have therefore implemented shiny new image viewers for Crypho: both on the desktop, mobile and web versions. Any time you decrypt and view an image, it will be shown temporarily inside the app. And you can of course zoom, pan and rotate  the images, just as you&amp;rsquo;d expect. When you are done viewing an image, it will be removed completely from your device, with no trace remaining.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/2017-03-10-image-viewer-desktop.jpg&#34; alt=&#34;image-viewer-desktop&#34; /&gt; &lt;img src=&#34;https://www.crypho.com/blogimages/2017-03-10-image-viewer-mobile.jpg&#34; alt=&#34;image-viewer-mobile&#34; /&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Colour identification to prevent accidental posts</title>
      <link>https://www.crypho.com/blog/2017-03-10-colours.html</link>
      <pubDate>Fri, 10 Mar 2017 00:14:00 +0200</pubDate>
      
      <guid>https://www.crypho.com/blog/2017-03-10-colours.html</guid>
      <description>&lt;p&gt;We have livened up the user interface by adding a distinct colour to each of your contacts and groups in your contact lists. The same colour is displayed inside the chats. This way you can quickly identify which chat you are in so you don&amp;rsquo;t risk sending anything to the wrong recipient.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/2017-03-10-colors2.jpg&#34; alt=&#34;colours&#34; /&gt; &lt;img src=&#34;https://www.crypho.com/blogimages/2017-03-10-contact-colours.jpg&#34; alt=&#34;colours&#34; /&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Transparency Report and Warrant Canary</title>
      <link>https://www.crypho.com/transparency.html</link>
      <pubDate>Mon, 06 Feb 2017 12:00:00 +0100</pubDate>
      
      <guid>https://www.crypho.com/transparency.html</guid>
      <description>

&lt;h3 id=&#34;transparency&#34;&gt;Transparency&lt;/h3&gt;

&lt;p&gt;Crypho has an extremely high focus on the privacy of our users and the confidentiality of their content. There may however be cases where we are presented with legal requirements to share information with government authorities. This page outlines our policies for how to manage this.&lt;/p&gt;

&lt;p&gt;First and foremost: Since all content in Crypho is encrypted with keys that only our customers hold, none of the content shared by our customers can be surrendered to authorities, regardless of warrants. The following policies are only related to the limited metadata that is available to us.&lt;/p&gt;

&lt;p&gt;Norwegian law allows for the government to issue warrants for seizure and search of stored  customer&amp;rsquo;s data on certain conditions.&lt;/p&gt;

&lt;p&gt;Crypho AS will not share customer data with any authorities unless compelled to do so by law. This means a request from a Norwegian court approved by a judge.&lt;/p&gt;

&lt;p&gt;Crypho is subject to Norwegian law only. Foreign agencies with requests for information should direct their requests to the Norwegian police. We cannot  comply with foreign requests that are not supported by a Norwegian court order.&lt;/p&gt;

&lt;p&gt;When legally possible, we will provide advance notice to our customers about any government data requests. We will inform about the warrant and about how it was handled. Where legally possible, we will also share the information publicly here.&lt;/p&gt;

&lt;h3 id=&#34;warrant-canary&#34;&gt;Warrant Canary&lt;/h3&gt;

&lt;p&gt;On some occasions, however, we may be prohibited from doing so by law. Some warrants come with a &amp;ldquo;gag order&amp;rdquo;, a restriction on informing customers or the public that there  warrant exists.  In order to still keep our customers informed, we have implemented a &amp;ldquo;Warrant Canary&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The idea behind a warrant canary is as follows: if Crypho receives legal demands with a gag order, we won&amp;rsquo;t be able to tell our customers. We can however, say that we have received no such requests, and update the statement regularly. Thus, if we stop saying we have received no requests, the implicit understanding will be that we have.&lt;/p&gt;

&lt;p&gt;Read about Warrant Canary on Wikipedia
&lt;a href=&#34;https://en.wikipedia.org/wiki/Warrant_canary&#34;&gt;https://en.wikipedia.org/wiki/Warrant_canary&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will post an updated Canary statement at least every month. If the update date on the Canary is more than 30 days old, you can assume we have received a warrant with a &amp;ldquo;gag order&amp;rdquo;.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;This is the Crypho Warrant Canary

As of 2017-05-16 10:40:00 CET

Crypho has received no warrants
for data seizure, metadata or other information

This note will be updated on a monthly basis.
&lt;/code&gt;&lt;/pre&gt;
</description>
    </item>
    
    <item>
      <title>Multiple email address support</title>
      <link>https://www.crypho.com/blog/2017-01-25-multiple-emails.html</link>
      <pubDate>Wed, 25 Jan 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.crypho.com/blog/2017-01-25-multiple-emails.html</guid>
      <description>&lt;p&gt;Many of our customers connect with people in differnt contexts. Many communicate in personal contexts where they identify with their personal email addresses, as well as in professional contexts where they identify with their work email.&lt;/p&gt;

&lt;p&gt;Crypho now supports multiple email addresses per account. You can add as many as you like.&lt;/p&gt;

&lt;p&gt;You can use the additional email addresses to log in, just like you do with your primary email. You passphrase and 2-factor authentication remains the same.&lt;/p&gt;

&lt;p&gt;When others send an invitation to you to an email address linked to your account, you will receive the invitation just as if they had sent the invitation to your primary email.&lt;/p&gt;

&lt;p&gt;To add an additional email address, click &amp;ldquo;my profile&amp;rdquo; in the menu in the desktop/web app. The profile page has a link to add additional email addresses. When you add another email, a confirmation mail will be sent to the address you added.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/my-profile.png&#34; alt=&#34;My Profile&#34; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/add-email.png&#34; alt=&#34;Add email address form&#34; /&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Introducing Recovery Keys</title>
      <link>https://www.crypho.com/blog/2017-01-120-recovery-keys.html</link>
      <pubDate>Fri, 20 Jan 2017 13:00:00 +0200</pubDate>
      
      <guid>https://www.crypho.com/blog/2017-01-120-recovery-keys.html</guid>
      <description>

&lt;p&gt;One of the most common customer requests we receive is the ability to reset your passphrase without losing your content and contacts. With the new recovery keys you can do this in a straightforward manner.&lt;/p&gt;

&lt;p&gt;The recovery key is a 256 bit key printed in the form of 24 words. It can be used to recover your account should you forget your passphrase.&lt;/p&gt;

&lt;p&gt;Here&amp;rsquo;s an example of how it might look:&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/2017-01-20-recoverykey.png&#34; alt=&#34;Example Recovery Key&#34; /&gt;&lt;/p&gt;

&lt;h4 id=&#34;creating-your-recovery-key&#34;&gt;Creating your recovery key&lt;/h4&gt;

&lt;p&gt;You can create a recovery key by selecting &amp;ldquo;Key recovery&amp;rdquo; in the menu in the Crypho desktop or web apps. It is not  possible to create recovery keys from the mobile app.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;https://www.crypho.com/blogimages/2017-01-20-key-recovery-menu.png&#34; alt=&#34;Key Recovery menu entry&#34; /&gt;&lt;/p&gt;

&lt;p&gt;It is only possible to have one recovery key available at any time. Creating a new recovery key instantly invalidates all previously generated recovery keys. &lt;/p&gt;

&lt;p&gt;The new recovery key will only be shown to you once. There is no way to access it again. We recommend that you write it down or print it on paper. Store your key in a safe place, for example in an envelope in a safe or bank deposit box. Do not store it digitally. And make sure no-one else gets access to it. &lt;/p&gt;

&lt;p&gt;Should you forget your passphrase or lose your two-factor authentication mechanism in the future, you will then be able to use this key to recover your account.   &lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>