Technical support
Technical support
- Popular questions
- What is "an encryption key generator" ? Why unencrypted communication is insecure? What is "crypto chat"? How can I secure Skype calls? What is "a crypto network"? How is an encryption key generator used? What is a hardware encryptor Stealthphone Hard? What is a "crypto conference"? Can hackers intercept an Internet call and decrypt it? How can I check my crypto number and the number of my crypto network? What types of files can be sent in encrypted messages? What languages does Stealthphone Hard support? Can I use Stealthphone Soft in my personal IP network? Does Stealthphone information security system have analogs? How safe is encryption used in Stealthphone information security system?
- Does your product have an open source code? What is Stealthphone information security system designed for? Can the hardware encryption device Stealthphone Hard be used as a phone? Is it possible to install Stealthphone Tell and Stealthphone Soft simultaneously on the same mobile phone (a tablet)? What is "an encryption key"? Are your products designed to facilitate criminal and terrorist activity? Has your product been certified for FIPS 140-2 or common security criteria? How many subscribers may there be in one crypto network? What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them? Shall I be able to use as before Skype (Viber) to make VoIP calls from a mobile phone or a tablet? Why are you offering a stand-alone encryption device instead of a phone with a built-in encryption device? Is encrypted communication between a hardware encryption device Stealthphone Hard and encryption software Stealthphone Soft available? Is it possible to secure information on a PC using a hardware encryption device Stealthphone Hard? What type of encryption is used in the corporate information security system Stealthphone? I am using Stealthphone Tell . Can I make an encrypted call to a subscriber using Stealthphone Soft ?
- Technical questions
- What types of files can be sent in encrypted messages? What is "crypto chat"? What is "an encryption key"? What is "a crypto network"? What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them? The signal is sometimes delayed during the transmission of encrypted voice. Is it normal? Shall I be able to use as before Skype (Viber) to make VoIP calls from a mobile phone or a tablet? Is it possible to secure information on a PC using a hardware encryption device Stealthphone Hard? Is it possible to install Stealthphone Tell and Stealthphone Soft simultaneously on the same mobile phone (a tablet)? I am using Stealthphone Tell . Can I make an encrypted call to a subscriber using Stealthphone Soft ? How can I secure Skype calls? Can the hardware encryption device Stealthphone Hard be used as a phone? Can I use Stealthphone Soft in my personal IP network?
- General
- Why unencrypted communication is insecure? Why are you offering a stand-alone encryption device instead of a phone with a built-in encryption device? What type of encryption is used in the corporate information security system Stealthphone? What languages does Stealthphone Hard support? What is Stealthphone information security system designed for? What is a hardware encryptor Stealthphone Hard? What is a "crypto conference"? What is "an encryption key generator" ? Our organization appreciated your solution, but do we really need Stealthphone information security system? Is encrypted communication between a hardware encryption device Stealthphone Hard and encryption software Stealthphone Soft available? How safe is encryption used in Stealthphone information security system? How many subscribers may there be in one crypto network? How is an encryption key generator used? How can I check my crypto number and the number of my crypto network? Has your product been certified for FIPS 140-2 or common security criteria? Does your product have an open source code? Does Stealthphone information security system have analogs? Can hackers intercept an Internet call and decrypt it? Are your products designed to facilitate criminal and terrorist activity?
Technical support
Could not find the answer? Contact our customer support