How EnKryptonite works
The EnKryptonite application encrypts your communications using military grade 256 Bit AES symmetric-key encryption algorithm with a unique, randomly generated encryption key. In addition to EnKryptonite's secure encryption, the Sender can apply an additional layer of security that includes a message Decryption Passcode to block unauthorized viewing and message destroy settings to limit the number of times a message can be viewed. The encrypted message is then presented as random characters to the recipient within the SMS application. The recipient is then able to decrypt and view the message through the use of the EnKryptonite application.
EnKryptonite establishes a secure relationship between the message sender and the message receiver. Both parties involved in the process of sending and receiving encrypted messages are authenticated and messages between them remain between them. Each layer of security applied to the sending, receiving and decryption exponentially increases the level of security. The device vetting, the validation, the Sender and Receiver relationship and the Message Decryption Passcode combined with the applied 256 Bit AES symmetric-key message encryption, protects your sensitive communications while allowing the flexibility to use the encryption technology across platform independent communication medium.
How messages are sent?
How to prevent a communication breach
Rest assured – messages are never stored
EnKryptonite Conditions Checklist
The exclusive EnKryptonite application makes encrypted messaging unique. The fact that you can live your life and choose to encrypt a text message using EnKryptonite makes it the most viable, secure, user-friendly method for digital communication. EnKryptonite only maintains a database of user accounts and their registered devices, by verification and securely storing a user's registration credential.
EnKryptonite mediates communications between its users and their associated devices, but does not store any private or secret keys, making it hack free. Unlike existing encryption service providers, messages do not pass through the company's servers. The Senders simply send the encrypted messages directly to the service provider. Unlike traditional encryption applications, there is no need for a message to be stored in order to be delivered to the Receiver. It is simply sent by the Sender to the Receiver like any other SMS.
Each user must register their account and their device by completing a verification step that ensures that they are in possession of the device. EnKryptonite will generate a verification number that will be sent to the applicant either through email or SMS which then must be entered into each device in order to begin sending or receiving encrypted messages.
Mobile apps for iOS and Android
The EnKryptonite application is available on iOS or Android operating platforms at the App Store and Google Play. Following the download of the application, the user is required to register their device. When a user desires to send and conduct a secure encrypted communication, they select the Encrypt optoin, select the message Contact or recipient, and proceed to type their message.